Saturday, October 29, 2011

DEFCON 19: A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux

Speaker: Alva 'Skip' Duckwall Northrop Grumman, Sr. Cyber Something or other

Using Linux and a device with 2 network cards, I will demonstrate how to configure an undetectable transparent bridge to inject a rogue device onto a wired network that is secured via 802.1x using an existing authorized connection. I will then demonstrate how to set up the bridge to allow remote interaction and how the entire process can be automated, creating the ultimate drop and walk away device for physical penetration testers and remote testers alike.


Post a Comment