YoVDO

Bypassing Advanced Device Profiling with DHCP Packet Manipulation

Offered By: NorthSec via YouTube

Tags

NorthSec Courses Cybersecurity Courses Network Security Courses Ethical Hacking Courses Risk Mitigation Courses

Course Description

Overview

Explore advanced device profiling bypass techniques through DHCP packet manipulation in this NorthSec conference talk. Delve into Network Access Control mechanisms, focusing on sophisticated device identification methods beyond simple MAC address checks. Learn how crafted DHCP packets can trick inspection engines into perceiving attacking devices as legitimate. Examine case studies demonstrating successful bypasses, understand associated risks, and discover mitigation strategies. Gain insights into a novel client-based DHCP attack that differs from traditional denial of service or rogue server approaches. Follow along as the speaker presents a proof-of-concept tool for defining custom DHCP payloads to mimic arbitrary device fingerprints, filling a gap in publicly available resources on this topic.

Syllabus

Introduction
Outline
What is Network Access Control
Where is it implemented
Two layers of defense
Device profiling
Device profiling mechanics
DHCP discover packet
Vendor class identifier
DHCP profiler policy
Bypass device profiling
Case study A
Case study B
Case study C
Risk mitigation
Proof of concept


Taught by

NorthSec

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX