ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 28 - PT0-002 discussion

Report
Export

A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?

A.
RFID cloning
Answers
A.
RFID cloning
B.
RFID tagging
Answers
B.
RFID tagging
C.
Meta tagging
Answers
C.
Meta tagging
D.
Tag nesting
Answers
D.
Tag nesting
Suggested answer: D

Explanation:

since vlan hopping requires 2 vlans to be nested in a single packet. Double tagging occurs when an attacker adds and modifies tags on an Ethernet frame to allow the sending of packets through any VLAN. This attack takes advantage of how many switches process tags. Most switches will only remove the outer tag and forward the frame to all native VLAN ports. With that said, this exploit is only successful if the attacker belongs to the native VLAN of the trunk link.

https://cybersecurity.att.com/blogs/security-essentials/vlan-hopping-and-mitigation

Tag nesting is a technique that involves inserting two VLAN tags into an Ethernet frame to bypass VLAN hopping prevention mechanisms. The first tag is stripped by the first switch, and the second tag is processed by the second switch, allowing the frame to reach a different VLAN than intended. RFID cloning is a technique that involves copying the data from an RFID tag to another tag or device. RFID tagging is a technique that involves attaching an RFID tag to an object or person for identification or tracking purposes. Meta tagging is a technique that involves adding metadata to web pages or files for search engine optimization or classification purposes.

asked 02/10/2024
jateen chibabhai
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first