Presentation is loading. Please wait.

Presentation is loading. Please wait.

Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1.

Similar presentations


Presentation on theme: "Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1."— Presentation transcript:

1 Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

2 UNCW NetReg 2

3 NetReg Vulnerability 3

4 Media Access Control address 6-octet hexadecimal identifier Unique to every network-enabled device 4

5 Vulnerability Exploitation Obtain the MAC address of a registered device. Use software to change an ‘attacker’ device’s MAC address to the registered value. Access the network using the ‘spoofed’ credentials (i.e., the registered MAC address). 5

6 Retrieving Targets Discovers IP & MAC of all machines connected to the local AP 6

7 Spoofing the Target’s MAC Address 7

8 Uses for MAC Address Spoofing Legitimate: - Creating wireless connections to a network. - Better method - Changing a device’s role, from router to computer and vice-versa. Illegitimate: - Unauthorized, stealthy access (intrusion) into a targeted restricted-access network. - Network traffic redirection. -> Obtain data from other systems on the network… 8


Download ppt "Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1."

Similar presentations


Ads by Google