What are VLAN’s implemented for?
Segmenting the network Reducing collisions Organizing the network Boosting performance Increasing security
Note: Switches provide the ability to create VLAN’s. This is useful for adding a layer of separation on the network without having to buy more switches.
What is VLAN Hopping? What are the two methods called?
When an attacker breaks out of a VLAN and gains access to other parts of the network.
Switch Spoofing
Double Tagging
Explain Switch Spoofing?
The attacker configures their device to pretend its a switch and uses it to negotiate a trunk link to break out of a VLAN.
Explain Double Tagging
The attacker adds an additional VLAN tag to create and outer and inner tag.