0

In the below scenario, I'm using Yersinia for VLAN Hopping through switch spoofing. Steps are:

  1. eth0 on kali is unset.

  2. runing Yersinia and launch a DTP attack (Sending DTP packet or Enabling trunk method)

  3. Check if eth0/3 (switchport) becoming trunk

  4. Launch wireshark on kali machine to see traffic going between vlan10 and vlan20

  5. Ping win7(vlan20) from ubuntuSrvr(vlan10)

in the result of attack interface eth0/3 goes to trunking status,

but wonder why I cannot see the traffic between Win7(vLAN20) and ubuntuSrvr(vLAN10) in wireshark??

Note: wireshark is running in kali machine (attacker machine).

enter image description here

enter image description here

Mehran
  • 1
  • 1
  • 1
    Why do you think legitimate machines in this setup must use Kali to communicate with each other? Have you tricked both switches into thinking router's MAC is behind ports e3/3 on IOU1 and e0/3 on IOU2 using ARP poisoning? Also, configurations for switches would be helpful for anyone willing to answer your question. – networkguy Nov 16 '21 at 20:36

0 Answers0