penetration testing: bypassing uncw netreg vince tran & howard kleinberg 1

8
Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

Upload: kathlyn-dennis

Post on 13-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

1

Penetration Testing:Bypassing UNCW NetReg

Vince Tran&

Howard Kleinberg

Page 2: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

2

UNCW NetReg

Page 3: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

3

NetReg Vulnerability

Page 4: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

4

Media Access Control address

• 6-octet hexadecimal identifier• Unique to every network-enabled device

Page 5: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

5

Vulnerability Exploitation

• Obtain the MAC address of a registered device.• Use software to change an ‘attacker’ device’s

MAC address to the registered value.• Access the network using the ‘spoofed’

credentials (i.e., the registered MAC address).

Page 6: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

6

Retrieving Targets

• Discovers IP & MAC of all machines connected to the local AP

Page 7: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

7

Spoofing the Target’s MAC Address

Page 8: Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1

8

Uses for MAC Address Spoofing• Legitimate:

- Creating wireless connections to a network.- Better method - Changing a device’s role, from router to computer and vice-versa.

• Illegitimate:- Unauthorized, stealthy access (intrusion) into a targeted restricted-access network.- Network traffic redirection.-> Obtain data from other systems on the network…