1 / 8

MAC Address Spoofing: Exploiting Vulnerabilities for Unauthorized Network Access

This article discusses the concept of MAC address spoofing and its implications in bypassing network restrictions. It covers techniques for obtaining and changing a device's MAC address, as well as the potential uses and risks associated with MAC address spoofing.

bridgetg
Download Presentation

MAC Address Spoofing: Exploiting Vulnerabilities for Unauthorized Network Access

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Penetration Testing:Bypassing UNCW NetReg Vince Tran& Howard Kleinberg

  2. UNCW NetReg

  3. NetReg Vulnerability

  4. Media Access Control address • 6-octet hexadecimal identifier • Unique to every network-enabled device

  5. Vulnerability Exploitation • Obtain the MAC address of a registered device. • Use software to change an ‘attacker’ device’s MAC address to the registered value. • Access the network using the ‘spoofed’ credentials (i.e., the registered MAC address).

  6. Retrieving Targets • Discovers IP & MAC of all machines connected to the local AP

  7. Spoofing the Target’s MAC Address

  8. Uses for MAC Address Spoofing • Legitimate:- Creating wireless connections to a network.- Better method - Changing a device’s role, from router to computer and vice-versa. • Illegitimate:- Unauthorized, stealthy access (intrusion) into a targeted restricted-access network.- Network traffic redirection.-> Obtain data from other systems on the network…

More Related