VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port that is not normally accessible from a given end system. (A VLAN is a local area network with a definition that maps devices on some other basis than geographic location - for example, by department, type of user, or primary application.)
A VLAN hopping attack can occur in either of two ways. If a network switch is set for autotrunking, the attacker turns it into a switch that appears as if it has a constant need to trunk (that is, to access all the VLANs allowed on the trunk port). In Cisco's Dynamic Trunking Protocol (DTP), the susceptibility of a system to this form of VLAN hopping can be minimized by turning off the autotrunking feature (DTP off) on all switches that do not need to trunk. In the second form of VLAN hopping, the hacker transmits data through one switch to another by sending frames with two 802.1Q tags, one for the attacking switch and the other for the victim switch. This fools the victim switch into thinking that the frame is intended for it. The target switch then sends the frame along to the victim port.
VLAN hopping can be used to steal passwords and other sensitive information from specific network subscribers. VLAN hopping can also be used to modify, corrupt, or delete data, install spyware or other malware programs, and propagate viruses, worms, and Trojans throughout a network.