-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CompTIA PenTest+ Study Guide
By :
Once you have gained access to one or more systems at a target location, or if you have obtained physical or wireless network access, you should consider how you can exploit the network itself. This can involve attacking network protocols and behaviors, conducting man-in-the-middle attacks to capture traffic that you wouldn’t normally be able to see, using denial of service (DoS) attacks to disable services or systems, or conducting attacks against security controls like NAC or encryption.
Virtual local area networks (VLANs) separate broadcast domains into separate sections for security or performance reasons. Many organizations use VLANs to create internal security boundaries between different systems or organizational units. This makes the ability to access a VLAN other than the one you are currently on an attractive opportunity for penetration testers.
There are two common means of conducting VLAN hopping attacks: double tagging and...
Change the font size
Change margin width
Change background colour