Guys,
You can test it also with Backtrack 5 ( application called YERSINIA ). 


Kamran Shakil 
Sr. Security Specialist
MDS Cisco IT Team
Line1: +968 9808 4652
Line2: +968 9800 8406




-----Original Message-----
From: [email protected] on behalf of Tyson Scott
Sent: Fri 8/5/2011 2:08 AM
To: 'CCIE Security Maillist'
Subject: Re: [OSL | CCIE_Security] OEQ - Yusuf - Double tagging
 
He is referring to the outside header of the packet.  Native vlan would cause a 
problem actually.  You can even use this basic description on Wikipedia for 
further reference.

http://en.wikipedia.org/wiki/VLAN_hopping

 

 

Regards,

 

Tyson Scott
CCIE # 13513 R&S, Security, and SP
Advanced Technology Racks LLC
[email protected]
Phone: 248-476-5372
Cell: 248-504-7309

 

From: [email protected] 
[mailto:[email protected]] On Behalf Of Bruno
Sent: Thursday, August 04, 2011 5:29 PM
To: CCIE Security Maillist
Subject: [OSL | CCIE_Security] OEQ - Yusuf - Double tagging

 

Question:
The exhibit illustrates how the advanced Double 802.1q Encapsulation VLAN 
hopping attack works. Name one additional prerequisite for this attack to work. 

Correct Answer:
The trunk port facing the attacker must be in the same VLAN for this attack to 
work. 

 

Doesn't he mean on the same native vlan? Since attacker will be sending forged 
dot1Q packets, attacker needs to set something at the native and I think this 
needs to match on  both sides


-- 
Bruno Fagioli
Cisco Security Professional


_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to