12.07.2015 Views

Bypassing NAC v2.0 - OSSIR

Bypassing NAC v2.0 - OSSIR

Bypassing NAC v2.0 - OSSIR

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Attack Vectors• A solution’s architecture– The placement of the different pieces of a solution• Technology used– Element detection– Quarantine abilities– Enforcement methods– End-point security assessment– Etc.• A solution’s components– Client-side software– Server-side software (and hardware)La plupart des méthodes deBy-Pass des solutions <strong>NAC</strong>existantes se situent dansl’exploitation de faiblessesinhérentes à latechnologie/méthode utilisée,plutôt que dans celle de faillesdans les logiciels clients ouserveurs.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!