Chapter
Clips
The speakers used publicly available information, such as IP addresses, to map out the office space and gain unauthorized access.
35:22 - 38:36 (03:13)
Summary
The speakers used publicly available information, such as IP addresses, to map out the office space and gain unauthorized access. They were able to walk around freely and even enter the employee break room without being challenged for not wearing badges.
ChapterIntroduction to Network Access Control (NAC)
Episode125: Jeremiah
PodcastDarknet Diaries
NAC is a security solution that restricts network access based on a device's MAC address.
38:36 - 40:05 (01:29)
Summary
NAC is a security solution that restricts network access based on a device's MAC address. This technology allows for better network control and security.
ChapterIntroduction to Network Access Control (NAC)
Episode125: Jeremiah
PodcastDarknet Diaries
Jeremiah was able to bypass network access by changing the MAC address on his computer to match that of the printers on the same network.
40:05 - 42:04 (01:58)
Summary
Jeremiah was able to bypass network access by changing the MAC address on his computer to match that of the printers on the same network.