VLAN Hopping - N10-008 CompTIA Network+ : 4.2

preview_player
Показать описание

- - - - -
VLANs are designed to prevent communication between subnets. In this video, you’ll learn how an attacker can use VLAN hopping to circumvent VLAN segmentation.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

Very clear explanation of an important network security topic. Liked & subscribed.

alanmcrae
Автор

Excellent content. Question: How would an attacker know which VLAN has trunks configured to different VLANs? And how would an attacker be able to send information from their device specifically to that other VLAN?

ghostgeode
Автор

So, if the packet didn't contain the outside tag with the native vlan on it, and only the tag of the intended target, THAT tag would be removed by the native vlan and the packet would go nowhere further than the native vlan, correct? There's no more direct approach to the intended vlan than via the native vlan?

陈瀚龙
Автор

Is the TAG in Double Tagging here the same as the “VLAN HEADER” mentioned in earlier videos ?

jakepayne
welcome to shbcf.ru