Your company network includes several VLANs to segregate different departmental data and to maintain secure communication channels. An attacker within the network managed to send packets from one VLAN to another despite the absence of a router facilitating inter-VLAN communication. Which technique is MOST likely being used by the attacker?
Double tagging
DNS poisoning
ARP spoofing
Switch spoofing