Penetration Testing mailing list archives

Re: Layer 2 Security And Penetration Testing


From: Jason Carr <jason () flacid org>
Date: Mon, 03 Jan 2005 19:15:13 -0500

Depending on what the "rules" of the pentest is, you can do the following... If there is equipment inside of the room you are in, usually there's a sticker on the bottom/side of equipment, expecially laptops, of the MAC address(es). This is the most likely thing that I would do. There's also the obvious calling somebody pretending to be IT and telling them you need the MAC and asking them to run ipconfig and giving you the results.

I'm interisted to hear how it turns out, if possible, let me/us know :)

- Jason

shiri yacov wrote:

Greetings to all PenTesters,
I am scheduled to perform a pentest in a big company, in the near future.
However, a little intelligence gathering has revealed that the company
has enforced secure MAC on her switches (any port transmitting on other than its known MAC address is immediatltly 
blocked until helpdesk releases it.
since my starting point is a "hot" port in the wall, and since I would not
give up on the first stage, I am looking for a way to get connected to
the net (using my allocated port) without activating any alarm when connecting to the net, and furthermore, without being blocked.

My idea so far includes spoffing my MAC address, however, I still dont know to which MAC address should I switch my MAC to ? how do I know which MAC address is the legal one on a specific port ?
Bruteforce is not an option - the port is frozen after 3 unsuccessful subsequent unauthorized MACs.

Did anyone ever came accross a similar configuration ? Do you have an
idea as to how can I bypass this.

Regards, Shiri, Security Consultant



Current thread: