layer2-attacks
Here are 3 public repositories matching this topic...
A lab in which the execution and prevention of layer 2 attacks are detailed.
-
Updated
Feb 15, 2026
This case study examines VLAN hopping—a network segmentation bypass technique where an attacker crafts specially tagged Ethernet frames to escape their assigned VLAN and access restricted segments. The attack exploits trust assumptions in Layer 2 switch configurations, especially mismanaged trunk ports and native VLAN behaviors.
-
Updated
May 19, 2025 - Jupyter Notebook
Improve this page
Add a description, image, and links to the layer2-attacks topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the layer2-attacks topic, visit your repo's landing page and select "manage topics."