Artwork
iconShare
 
Manage episode 495516450 series 3678646
Content provided by Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

VLANs offer segmentation—but they’re not invulnerable. In this episode, we look at how attackers can bypass VLAN boundaries using VLAN hopping techniques like double-tagging and switch spoofing. You’ll learn how misconfigured trunk ports, native VLANs, and default switch behaviors create opportunities for unauthorized access between VLANs.

We also explore other Layer 2 vulnerabilities, including MAC flooding and CAM table exhaustion, which can disrupt switch behavior or enable packet sniffing. The episode includes hardening tips like disabling unused ports, setting the native VLAN to an unused ID, and restricting VLAN access to known interfaces. This is essential material for defending against internal threats and securing your switch infrastructure.

  continue reading

184 episodes