VLAN Attacks
Ahmed Shawky
Network Security Engineer| CCNP, NSE4, Palo Alto, MCSA, SENSS, SIMOS, SISAS
VLAN Hopping attack (Switch spoofing)
-Spoofing DTP Messages from the attacking host to cause the switch to enter trunking mode.
-Attacking device gains access to data on all VLANs carried by the negotiated trunk.
the attack steps:-
The Mitigation:-
Double-Tagging VLAN Attack
-An important characteristic of the double encapsulated VLAN hopping attack is that it works even if trunk ports are disabled.
-the attacker must be in the native VLAN.
-one way attack. (can use to send malicious).
-this attack is unidirectional.
The Mitigation
Change the native VLAN and don’t put any device on the native VLAN.
Network Security & SOC | FortiGate | ASA | Cisco ISE || NSE4 | CCNP Security | Cisco CyberOps | IBM QRadar | CEH v 10 | MCSA | Network Security Content Creator
1 年Great!
Network Security
1 年Bravo ????????