[Tutorial] Bypass Cisco NAC Web Agent

I’d also like to share a method with you for bypassing Cisco’s internet control system. This system of restriction is very unnecessary and is activated when logging in to the Internet on a personal computer. Why don’t we want it?

  • It needs Java as a plugin (Java is not bad but it updates so frequently that your browser might harass you about updating it)
  • It will force you to have all Microsoft updates before allowing you Internet access (hmm, how will we update without Internet?)
  • It requires adequate antivirus software to be installed, something that people like me might lack (I recommend a good antivirus like Malwarebytes, not Norton or any paid software)

Why do we want it?

  • We have an hour of time to burn whenever there is an update (just kidding).
  • It might actually prevent you from getting a virus if you download Grand Theft Auto 6, Battlefield 5, or CoD Black Ops 4. (Maybe).

Method #1

Most login interfaces provided by Cisco provide guest access. There will either be a button titled “Guest Access” that you can click, or you can use “guest” as your username and password (you might have to change the “Network” option to “Local DB”). However, this guest access usually has restrictions, such as only being able to use port 80. If you want to bypass the restrictions placed on the guest account with method #2, this guest access will be necessary.

Method #2

How can you fool this Cisco control system? Change your User-Agent string. Have no clue what that means? No problem. All you need to do is use the guest access provided in method #1 to google “user agent switcher (browser name)” and get the most popular plugin (the first result on Google) for your browser. Then, change your user agent by going into the plugin and choosing Android, iOS, or Internet Explorer 6. After you log in with this fake user agent, just switch it back to the default and browse without worries.

About the author


The site admin :)

Readers Comments (1)

  1. endermanenderman November 4, 2015 @ 4:26 AM

    hey hack

Leave a comment

Your email address will not be published.