Git Product home page Git Product logo

nacky's Introduction

NACKY

Bypass Network Access Control (NAC, 802.1x)

Nacky - Network Access Control Bypass Tool (v1.0)

Nacky is a Python-based Network Access Control (NAC) bypass tool, which allows an attacker to gain unauthorized access to a network by bypassing NAC mechanisms. The tool is based on the NACkered script and the nac_bypass_setup.sh solution. I want to express my gratitude to the original authors of these scripts.

Requirements

To perform an NAC bypass, you need access to an authenticated device. This device is used to log into the network and smuggle network packets from another device. You can achieve this by placing the attacker's system between the network switch and the authenticated device using a Raspberry Pi and two network adapters.

Installation

Nacky was developed and tested on Debian-based Linux distributions, but it should be compatible with other Linux distributions as well. The following software packages are required:

  1. Install tools, on Debian-like distros: bridge-utils macchanger arptables ebtables iptables net-tools tcpdump
  2. Load kernel module: modprobe br_netfilter
  3. Persist kernel module: br_netfilterinto /etc/modules

For arptables, iptables, and ebtables, make sure not to use Netfilter xtable tools (nft), or the script will not work as desired.

Usage

  1. Disconnect the legitimate device (client) from the network switch.
  2. Start the script on the attacker device (bypass). The bypass and attacker devices are the same physical device. The attacker figure symbolizes actions carried out by the attacker on the NAC bypass device.
  3. Perform the initial configuration, which includes stopping unwanted services, disabling IPv6, and initializing DNS configurations.
  4. Configure and start the bridge. Adjust the kernel to forward EAPOL frames for successful 802.1X authentication.
  5. Connect the network cables and enable the bridge's switch side as a passive forwarder. The client should now be authenticated with the network switch and can log into the network successfully.
  6. Analyze the network traffic passing through the bridge to capture Kerberos and SMB packets. This information is used to automatically configure the client side of the bridge.
  7. If port forwarding has been enabled for SSH and Responder, the bridge forwards all requests for the respective ports to the attacker's services. Responder
  8. Run Responder on the bridge interface with the correct IP address for poisoning multicast using the -e parameter:
./Responder.py -I <bridge_interface> -e <client_address> ...

Acknowledgements

We would like to thank the original authors of the NACkered script and the nac_bypass_setup.sh solution for their valuable work, which served as the foundation for the development of nacky.

nacky's People

Contributors

emnaruto07 avatar

Stargazers

 avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.