DEF CON 19: Defeating wired 802.1x with a transparent bridge using Linux
Speaker: Alva ‘Skip’ Duckwall
Using Linux and a device with 2 network cards, I will demonstrate how to configure an undetectable transparent bridge to inject a rogue device onto a wired network that is secured via 802.1x using an existing authorized connection.
I will then demonstrate how to set up the bridge to allow remote interaction and how the entire process can be automated, creating the ultimate drop and walk away device for physical penetration testers and remote testers alike.
Main category
Hacking
Subcategory
Hacking