penetration testing bypassing uncw netreg
Download
Skip this Video
Download Presentation
Penetration Testing: Bypassing UNCW NetReg

Loading in 2 Seconds...

play fullscreen
1 / 8

Penetration Testing: Bypassing UNCW NetReg - PowerPoint PPT Presentation


  • 140 Views
  • Uploaded on

Penetration Testing: Bypassing UNCW NetReg. Vince Tran & Howard Kleinberg. UNCW NetReg. NetReg Vulnerability. Media A ccess Control address. 6-octet hexadecimal identifier Unique to every network-enabled device . Vulnerability Exploitation.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Penetration Testing: Bypassing UNCW NetReg' - callia


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
media a ccess control address
Media Access Control address
  • 6-octet hexadecimal identifier
  • Unique to every network-enabled device
vulnerability exploitation
Vulnerability Exploitation
  • Obtain the MAC address of a registered device.
  • Use software to change an ‘attacker’ device’s MAC address to the registered value.
  • Access the network using the ‘spoofed’ credentials (i.e., the registered MAC address).
retrieving targets
Retrieving Targets
  • Discovers IP & MAC of all machines connected to the local AP
uses for mac address spoofing
Uses for MAC Address Spoofing
  • Legitimate:- Creating wireless connections to a network.- Better method - Changing a device’s role, from router to computer and vice-versa.
  • Illegitimate:- Unauthorized, stealthy access (intrusion) into a targeted restricted-access network.- Network traffic redirection.-> Obtain data from other systems on the network…
ad