Wireless ACL Bypassing - The Spoofing Attack
If you set up a wireless network, it is ALWAYS good practice to implement an encryption and authentication protocol, such as WPA2 at a minimum, as long as your passphrase meets a length which can be difficult for attackers to brute force. I made this video because I was asked to test an IoT device on an OPEN wireles network, which made me think, 'What could I do to add a small layer of defence?' But then I thought, 'How could I exploit this first layer of defence?' The particular IoT device needs to communicate to a processor, so adding it to a VLAN with out inter-LAN routing enabled would be difficult. However, the reason for this video is to show how a MAC ACL is not immune to attack
If you set up a wireless network, it is ALWAYS good practice to implement an encryption and authentication protocol, such as WPA2 at a minimum, as long as your passphrase meets a length which can be difficult for attackers to brute force. I made this video because I was asked to test an IoT device on an OPEN wireles network, which made me think, 'What could I do to add a small layer of defence?' But then I thought, 'How could I exploit this first layer of defence?' The particular IoT device needs to communicate to a processor, so adding it to a VLAN with out inter-LAN routing enabled would be difficult. However, the reason for this video is to show how a MAC ACL is not immune to attack