Skip to content

Instantly share code, notes, and snippets.

Switch (cEOS) Configuration

SW1 (Attacker-side Switch)

Switch connected to the attacker. Configure eth1 as a trunk port with native VLAN (vulnerability).

# Enter SW1 console
docker exec -it clab-vlan_hopping_lab_sw2-sw1 Cli

# cEOS Configuration
enable
#!/usr/bin/env python3
"""
VLAN Hopping Attack Demo (Educational Purpose Only)
Demonstrates single-tagged VLAN hopping exploit
"""
from scapy.all import Ether, Dot1Q, IP, ICMP, sendp
def main():
print("[DEMO] Sending single-tagged ICMP packet (VLAN 20)...")
name: vlan_hopping_lab_sw2
topology:
nodes:
sw1:
kind: arista_ceos
# Note: Adjust this image tag to match the tag you used for docker import
image: ceos:4.34.0F
sw2: