Your company network includes several VLANs to segregate different departmental data and to maintain secure communication channels. An attacker within the network managed to send packets from one VLAN to another despite the absence of a router facilitating inter-VLAN communication. Which technique is MOST likely being used by the attacker?
DNS poisoning
ARP spoofing
Double tagging
Switch spoofing