A module for emulating networks using python objects
-
Updated
Apr 6, 2020 - Python
8000
A module for emulating networks using python objects
Enhanced Frogger for VLAN Hopping
Multiple attacks over ISO/OSI layer 2 level
This case study examines VLAN hopping—a network segmentation bypass technique where an attacker crafts specially tagged Ethernet frames to escape their assigned VLAN and access restricted segments. The attack exploits trust assumptions in Layer 2 switch configurations, especially mismanaged trunk ports and native VLAN behaviors.
Here is a Proof-of-Concept (PoC) in Python using Scapy to simulate a VLAN Hopping Double Tagging attack. This script creates and sends an Ethernet packet with double 802.1Q tagging, where the first tag (Outer VLAN 10) is stripped by a vulnerable switch, allowing the packet to reach an unauthorized VLAN (Inner VLAN 20).
Add a description, image, and links to the vlan-hopping topic page so that developers can more easily learn about it.
To associate your repository with the vlan-hopping topic, visit your repo's landing page and select "manage topics."