Facebook

Saturday, January 11, 2014

[NETWORK] BYPASSING SWITCH PORT SECURITY

Hello Haxors !

In this Tutorial I will teach you how to bypass port security

Let us suppose you have physical access in a Corporate Office or a data center , Where each host is fixed with a port and its Hardware ID Has been Saved in "Switch's ACL . So you cannot attach your attacker machine via LAN in the same network because ACL doesn't allow you for this action.

Switch Screenshot:-

So how to Bypass this Mother fuckin port Security as each Host's Hardware ID is fixed for each port and if we try to change the host the port Block our access .

In out Case For attacking into this network we are having backtrack in our Attacking machine .

so lets start

Step one , Remove the LAN Cable from the Host , attach your Portable LCD with the host go to Boot menu and Get Hardware ID / MAC from There , Now open your backtrack and spoof your Hardware ID with the Id of the Host .

For changing Hardware ID 1st bring LAN port Down

Code:
ifconfig eth1 down
Now We have to change our hardware ID with the Hardware ID of that Host for this open your terminal and type

Code:

macchanger  -m  1a:2b:3c:4d:5e:6f eth1
where eth1 is your LAN port and 1a:2b:3c:4d:5e:6f is the host's hardware ID which is a trusted ID on the Switch's port
Now bring ur eth1 up



Code:

ifconfig eth1 up
And Now Attach LAN Cable Which Is Linked With Switch With Your Attacking Machine, Congratulation You've Successfully Bypassed the Port Security. Now You May Can Execute Your Network Based Attack On Other Hosts.
Note: This Tech only works when DAI (dynamic ARP Inspection) Tech is not applied on the network.
Hope You Like It :)

0 comments:

Post a Comment