Penetration testing bypassing uncw netreg
Download
1 / 8

Penetration Testing: Bypassing UNCW NetReg - PowerPoint PPT Presentation


  • 140 Views
  • Uploaded on

Penetration Testing: Bypassing UNCW NetReg. Vince Tran & Howard Kleinberg. UNCW NetReg. NetReg Vulnerability. Media A ccess Control address. 6-octet hexadecimal identifier Unique to every network-enabled device . Vulnerability Exploitation.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Penetration Testing: Bypassing UNCW NetReg' - callia


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Penetration testing bypassing uncw netreg

Penetration Testing:Bypassing UNCW NetReg

Vince Tran&

Howard Kleinberg


Uncw netreg
UNCW NetReg


Netreg vulnerability
NetReg Vulnerability


Media a ccess control address
Media Access Control address

  • 6-octet hexadecimal identifier

  • Unique to every network-enabled device


Vulnerability exploitation
Vulnerability Exploitation

  • Obtain the MAC address of a registered device.

  • Use software to change an ‘attacker’ device’s MAC address to the registered value.

  • Access the network using the ‘spoofed’ credentials (i.e., the registered MAC address).


Retrieving targets
Retrieving Targets

  • Discovers IP & MAC of all machines connected to the local AP



Uses for mac address spoofing
Uses for MAC Address Spoofing

  • Legitimate:- Creating wireless connections to a network.- Better method - Changing a device’s role, from router to computer and vice-versa.

  • Illegitimate:- Unauthorized, stealthy access (intrusion) into a targeted restricted-access network.- Network traffic redirection.-> Obtain data from other systems on the network…


ad