1. Vendor Documentation:
Cisco Systems
Inc. (2002). VLAN Security White Paper. Section: "VLAN Hopping Attacks
" Subsection: "Switch Spoofing." This document states
"A switch spoofing attack is initiated by an attacking host that is capable of emulating a switch... The attacking host is then able to generate DTP messages and to become a neighbor switch. If successful
the attacking host becomes a switch and forms a trunk link with the victim switch."
(Available through Cisco public documentation archives).
2. University Courseware:
Parno
B. (2011). Lecture 10: Network Security. Carnegie Mellon University
Course 15-410: Operating System Design and Implementation. Slide 23
"VLAN Hopping." The slide describes how an attacker can "Spoof DTP packets from a host to a switch
to make it think you are a switch that wants to form a trunk."
(Available via CMU's public courseware site).
3. Academic Publication:
Kim
Y.
& Shavitt
Y. (2013). Measuring the "V" in VLANs. In Proceedings of the 2013 conference on Internet measurement conference (IMC '13). Association for Computing Machinery
New York
NY
USA
423–436. Section 2.2
"VLAN Hopping
" describes switch spoofing as a method where "an attacker can spoof a switch by sending DTP (Dynamic Trunking Protocol) frames."
DOI: https://doi.org/10.1145/2504730.2504767