What is a method to launch a VLAN hopping attack?
- introducing a rogue switch and enabling trunking
- flooding the switch with MAC addresses
- sending spoofed IP addresses from the attacking host
- sending spoofed native VLAN information
Explanation & Hint:
A VLAN hopping attack is where a device on one VLAN can receive traffic from another VLAN that it’s not a member of. One of the common methods to launch a VLAN hopping attack involves sending spoofed native VLAN information. Here’s how the attack works using spoofed native VLAN information:
The attacker’s system essentially pretends to be a switch expecting untagged frames from the native VLAN, which the switch obligingly sends. This is a form of VLAN hopping because the traffic “hops” from the native VLAN to another without passing through a router. Sending spoofed native VLAN information is a more direct and common method of VLAN hopping compared to the other options listed, which are:
|