A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?
I think it's D, since vlan hopping requires 2 vlans to be nested in a single packet.
Double tagging occurs when an attacker adds and modifies tags on an Ethernet frame to allow the sending of packets through any VLAN. This attack takes advantage of how many switches process tags.
Most switches will only remove the outer tag and forward the frame to all native VLAN ports. With that said, this exploit is only successful if the attacker belongs to the native VLAN of the trunk link.
https://cybersecurity.att.com/blogs/security-essentials/vlan-hopping-and-mitigation
is using nested tags inside a packet to attempt to hop VLANs. If he is successful, his
packets will be delivered to the target system, but he will not see any response
This section is not available anymore. Please use the main Exam Page.PT1-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Davar39
Highly Voted 3 years, 7 months agoMeisAdriano
Most Recent 1 year agoRightAsTain
2 years, 10 months agoPokok2021
2 years, 11 months agokiduuu
3 years, 3 months ago[Removed]
3 years, 5 months agoBinarySoldier
3 years, 6 months ago