#
layer2-attacks
Here are 2 public repositories matching this topic...
This case study examines VLAN hopping—a network segmentation bypass technique where an attacker crafts specially tagged Ethernet frames to escape their assigned VLAN and access restricted segments. The attack exploits trust assumptions in Layer 2 switch configurations, especially mismanaged trunk ports and native VLAN behaviors.
vlan-hopping layer2-attacks network-segmentation-bypass switch-misconfiguation host-to-network-triage
-
Updated
May 19, 2025 - Jupyter Notebook
Improve this page
Add a description, image, and links to the layer2-attacks topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the layer2-attacks topic, visit your repo's landing page and select "manage topics."