80 likes | 90 Views
This article discusses the concept of MAC address spoofing and its implications in bypassing network restrictions. It covers techniques for obtaining and changing a device's MAC address, as well as the potential uses and risks associated with MAC address spoofing.
E N D
Penetration Testing:Bypassing UNCW NetReg Vince Tran& Howard Kleinberg
Media Access Control address • 6-octet hexadecimal identifier • Unique to every network-enabled device
Vulnerability Exploitation • Obtain the MAC address of a registered device. • Use software to change an ‘attacker’ device’s MAC address to the registered value. • Access the network using the ‘spoofed’ credentials (i.e., the registered MAC address).
Retrieving Targets • Discovers IP & MAC of all machines connected to the local AP
Uses for MAC Address Spoofing • Legitimate:- Creating wireless connections to a network.- Better method - Changing a device’s role, from router to computer and vice-versa. • Illegitimate:- Unauthorized, stealthy access (intrusion) into a targeted restricted-access network.- Network traffic redirection.-> Obtain data from other systems on the network…