Explore pentesting techniques for network layers 2 and 3 in this conference talk from BSides Cleveland 2014. Dive into various network protocols and attack vectors, including CDP attacks, DHCP exploits, and routing protocol vulnerabilities. Learn about defense mechanisms like DHCP snooping and dynamic trunking protocol. Discover tools such as Puppetscape II, voidpopper, and Sheena for network exploitation. Witness a live demo showcasing router manipulation, DNS spoofing, and packet analysis. Gain insights into establishing effective working relationships in the cybersecurity field and understand the importance of defending against BGP attacks.