Link to this headingVLAN Hopping
Attack Types:
- Double Tagging: By adding two different VLAN tags to the frame being transmitted it can trick the router into making the packet think it is sent from the VLAN specified by the first VLAN tag.
- Switch Spoofing: The attacker imitates a trunking switch and sending the Tagging and Trunking Protocols to maintain the VLAN.
Link to this headingDouble Tagging
- This is one way traffic and can not get data back.
Link to this headingAttacks
ICMP PoC:
Link to this headingMitigation
Link to this headingSwitch Spoofing
- Because of bad defaults this makes it possible for an attacker to do this attack including
- allow DTP
- negotiations of a trunk
- VLAN 1 as its native VLAN
Bad Cisco Configuration:
show int gig0/13 switchport
- Administrative mode: Dynamic Auto
- Administrative Trunking Encapsulation: negotiate
- Operation mode: static access
- Negotiation of Trunking: On
- Access Mode VLAN: 1
- Trunking Native Mode VLAN: 1
- Trunking VLANS Enabled: All
show int trunk
- Verify that the gig0/13 port does not have a trunk set
Link to this headingAttacks
VLAN Hopping Concept, Attack example and Prevention
Inital start:
Link to this headingMitigation
Set all of the unused ports on the switch to these configurations
- Set the switchport to not be a access port
- Set the switchport’s VLAN to an unused VLAN that does not have any connections to others
- Disable DTP on the port
- Set the native VLAN to one that is not used and does not go anywhere
- The switchport port is administratively shutdown.
- Never use VLAN 1 for anything – unless you must to integrate with other vendor devices.