NAC Bypass Cheatsheet
This post lists down a few of the techniques which can be used to bypass Network Access Control solutions(NAC).
Last updated
This post lists down a few of the techniques which can be used to bypass Network Access Control solutions(NAC).
Last updated
In a pre-connect scenario decisions to grant access control rights are made before granting any access to the network resources.
Mac Spoofing It is possible to spoof the mac address of following devices and obtain network access.
Physical devices like old VOIP phone, Printers, cameras etc may not support 802.1x authentication and mac addresses assigned to these devices can be spoofed to obtain IP address.
Physical access to 802.1x authenticated VOIP phones, printer, etc may disclose mac and IP info from the network settings menu, stickers on the backside, etc.
Boot menu of certain workstations, laptops etc may disclose mac address.
VOIP Hopping via CDP packets CDP protocol can be abused to hop the VLAN and obtain IP address.
Voiphopper tool can be used to execute this attack.
VLAN Hopping via DTP Packets It is possible to hop vlans by abusing DTP protocol. Frogger can be used to execute such attacks.
Pre-authenticated device Pre-authenticated devices can be used to bypass NAC solutions . In this situation an attacker will place a rogue device such as a raspberry pi between supplicant and authentication server. The traffic will then flow through the rogue device placed by the attacker.
Physical access to the network switch Obtaining physical access to the network switch and changing the configuration is one of the toughest but foolproof way of bypassing NAC solutions 🤢.
Probe Request Fire up wireshark and check for MAC addresses in probe request. Try spoofing the MAC gathered from probe request.
In a post-connect scenario you are allowed to the network for a small period of time and a set of checks are ran against your endpoint. If the endpoint fails to meet the requirements, it will be disallowed to use any resource further.
Mac randomization As mentioned before in a post-connect scenario, it is possible to use the network resources for a small period of time while a requirement check is done. In this situation an attacker can change his MAC address to attain a new IP address prior to getting blocked and continue using the network resources. Below is a small python script which I made to automate this.
UDP Filtering Sometimes NAC solutions will only disallow TCP connections but UDP connections would still be allowed and an attacker can leverage this to conduct NETBIOS scan in order to obtain IP and MAC addresses.
Name
Link
Nackered
Fenrir
Silentbridge
BITM