When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather information?