Organizations using port-based network access control (NAC) devices to contain wireless intruders may be less secure than they assume.
Unless an organization is using the most secure WPA2-EAP authentication, an attacker with an initial foothold on the enterprise wireless network can bypass the protections enabled by NAC appliances and pivot deeper into the enterprise.
Leave a reply