Organizations using port-based network access control (NAC) devices to contain wireless intruders may be less secure than they assume. An attacker with an initial foothold on the enterprise wireless network can bypass the protections enabled by NAC appliances and pivot deeper into the enterprise. Security engineer Gabriel Ryan, security engineer at Gotham Digital Science, will present a paper on the topic at the upcoming SecTor security conference in Toronto this month. Ryan’s presentation on the “Black Art of Wireless Post-Exploitation” examines the implications of the practice by many organizations.”]
Source: https://www.darkreading.com/attacks-breaches/how-wireless-intruders-can-bypass-nac-controls