During hard disk data sorting, we found the original dtp vlan jump experiment video, which includes DTP protocol data packets, test tools, videos, and lazy. The following are the steps. Download the video and watch it. It was very casual. At that time, I kept it for reference.
Implementation of VLAN jump attacks
I don't talk much about it. I only find such a term on the Internet. No one has told me the specific technical details.
Attackers are often unwilling to be restricted in a VLAN. (I don't think so)
Our goal this time is a Cisco switch. I have a limited environment here. I can only find a Cisco 2950 instance to try it out.
To put it simply, use the DTP protocol to negotiate the switch port into a trunk port, and then send the data with the 802.1Q label to the target VLAN.
Watch the video without talking nonsense.
Use Sniffer Pro to open the DTP data packet, and then we need to modify the data packet content.
These two data packets are the original data packets I have modified. All you need to do is modify the Mac and a key value.
The packet is modified in this way. My Mac is changed to start with 00 0d 28 starting with Cisco. Now we open wireshare, which is really hard to spell out English.
Send the currently modified data packet, one per second. Negotiation is in progress.
Wait a moment. Now I am using the trunk port. You can receive broadcasts from all VLANs.
I am from 5 CIDR blocks. Now I can receive information from 0, 1, 4, and other CIDR blocks. Is it very easy.
Forgot what to do, dizzy
Think of it, attack the VLAN gateway. Hey hey, it's evil.
How many milliseconds is the packet sending latency? select your Nic. It's too slow. I cannot find the data packet. It's a problem with the dizzy data packet. It's too much nonsense. Evil. Who has changed my data packet?
In fact, I added a wrong location, and the packet was sent. It's not nonsense. I bound the switch here, so it won't work.
That's all. Nonsense. Zui
: Http://download.csdn.net/source/2405641