When a hacker attempts to perform a VLAN hopping attack, what are the two approaches likely to be used?

What will be an ideal response?


ANSWER: The two approaches the hacker might use for VLAN hopping are as follows:
* double tagging-The hacker stacks VLAN tags in Ethernet frames. When the first, legitimate tag is removed by a switch, the second, illegitimate tag is revealed, tricking a switch into forwarding the transmission on to a restricted VLAN.
* switch spoofing-An attacker connects to a switch and then makes the connection look to the switch as if it's a trunk line. The switch might autoconfigure its port into trunk mode when it detects trunk mode on the other end of the connection. A hacker can then feed his own VLAN traffic into that port and access VLANs throughout the network.

Computer Science & Information Technology

You might also like to view...

An algorithm is

a. The inputs and outputs of a program b. The part of the computer that does the processing c. A finite set of steps to solve a problem d. A complete computer program

Computer Science & Information Technology

Most slide layouts do not include any placeholders.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The name of the Web page appears on the status bar at the top of the window.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____________________ has predefined fonts, font sizes, font colors, and background graphics.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology