A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux

DEF CON 19

Presented by: Alva Duckwall (Skip)
Date: Sunday August 07, 2011
Time: 12:00 - 13:50
Location: Track 1
Track: Track 1

Using Linux and a device with 2 network cards, I will demonstrate how to configure an undetectable transparent bridge to inject a rogue device onto a wired network that is secured via 802.1x using an existing authorized connection. I will then demonstrate how to set up the bridge to allow remote interaction and how the entire process can be automated, creating the ultimate drop and walk away device for physical penetration testers and remote testers alike.

Alva Duckwall

Alva 'Skip' Duckwall has been using Linux back before there was a 1.0 kernel and has since moved into the information security arena doing anything from computer/network auditing, to vulnerability assessments and penetration testing. Skip currently holds the following certs: CISSP, CISA, GCIH, GCIA, GCFW, GPEN, GWPT, GCFA, GSEC, RHCE, and SCSA and is working on getting his GSE. Skip currently works for Northrop Grumman as a Sr. Cyber Something or other.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats