Your company network includes several VLANs to segregate different departmental data and to maintain secure communication channels. An attacker within the network managed to send packets from one VLAN to another despite the absence of a router facilitating inter-VLAN communication. Which technique is MOST likely being used by the attacker?
ARP spoofing
Switch spoofing
DNS poisoning
Double tagging