What are the primary attack methods of VLAN hopping? (Choose two.)

Posted by: Pdfprep Category: 210-260 Tags: , ,

What are the primary attack methods of VLAN hopping? (Choose two.)
A . VoIP hopping
B . Switch spoofing
C . CAM-table overflow
D . Double tagging

Answer: B,D

Explanation:

VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible. There are two primary methods of VLAN hopping: switch spoofing and double tagging.

+ In a switch spoofing attack, an attacking host imitates a trunking switch by speaking the tagging and trunking protocols (e.g. Multiple VLAN Registration Protocol, IEEE 802.1Q, Dynamic Trunking Protocol) used in maintaining a VLAN. Traffic for multiple VLANs is then accessible to the attacking host.

+ In a double tagging attack, an attacking host connected on a 802.1q interface prepends two VLAN tags to packets that it transmits.

Source: https://en.wikipedia.org/wiki/VLAN_hopping

Leave a Reply

Your email address will not be published.