1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Switch Spoofing
pretend to be a switch and sends trunk negotiation and gains access to the switch
needs physical access to the switch
double tagging
craft a packet that includes two VLAN tags
takes advantage of the native VLAN configuration
The first native VLAN tag is removed by the first switch and the second fake tag is now visible to the second switch, which the pack is forwarded to the target
blank
blank