Overview
This course teaches learners how to understand and exploit MAC address filtering on networks. By exploring topics such as defeating MAC filtering, changing MAC addresses, and cloning MAC addresses, students will gain practical skills in circumventing network security measures. The teaching method includes demonstrations and practical examples to illustrate concepts effectively. This course is intended for individuals interested in network security, ethical hacking, and cybersecurity.
Syllabus
Countdown
Intro
MAC Filtering on Your Home Router
How Hackers Defeat MAC Filtering
MAC Addresses that Leave a Network
MAC Blacklist Testing
Changing your MAC
Circumventing the Blacklist
MAC Whitelisting Demo
Finding Other devices on the Network
Cloning a MAC Address
Wrapping Up
Endscreen
Taught by
SecurityFWD