This is one of the VLAN-related attacks that can be executed. The objective behind this attack is that the attacker wants to move from the given VLAN to a new VLAN where the intended victim is placed. This can be evoked by using a concept called double-tagging.
VLAN hopping
Double-tagging
Double-tagging is a method by which the attacker tries to reach a different VLAN using the vulnerabilities in the trunk port configuration.
This is achieved by first making note of the native VLAN configured on the trunk link connected to the switch ports. The attacker creates a trunk port between their PC and the switch by using the DTP negotiation methods. Then the attacker creates a double tag with the intended VLAN as the inside tag,...