/
10.2.2.1.10. Vlan Hopping Attack / Spoofing Attack

SecHard

10.2.2.1.10. Vlan Hopping Attack / Spoofing Attack

VLAN Hopping is a type of network attack where an attacker connected to an access port (which is connected to a specific VLAN) can access network traffic from other VLANs. Normally, a computer connected to a 48 switch access port (connected to a specific VLAN) can only receive traffic from the VLAN associated with that switch port.

Using a VLAN-hopping attack, an attacker can sniff network traffic from another VLAN using a sniffer (protocol analyzer) or send traffic from one VLAN to another VLAN. There are two types of VLAN hopping attacks. These are the Key Spoofing attack and the Double Tagging attack.

VLAN Hopping Switch Spoofing and VLAN Hopping Double Tagging attacks are prevented by using Nonegotiate and Native VLAN control.

switchport mode access

switchport nonegotiate 

switchport mode trunk

switchport trunk encapsulation dot1q

 

Related content

10.2.2.1.4.10. Vlan Hopping Attack / Spoofing Attack
10.2.2.1.4.10. Vlan Hopping Attack / Spoofing Attack
More like this
VLAN Hopping Attack
VLAN Hopping Attack
More like this
10.2.2.1.8. ARP Spoofing Attack / Spoofing Attack
10.2.2.1.8. ARP Spoofing Attack / Spoofing Attack
More like this
Mac Flooding Attack
Mac Flooding Attack
More like this
10.2.2.1.2. MAC Flooding Attack / Flooding Attack
10.2.2.1.2. MAC Flooding Attack / Flooding Attack
More like this
10.2.2.1.6. STP Manipulation Attack / Manipulation Attack
10.2.2.1.6. STP Manipulation Attack / Manipulation Attack
More like this

SecHard