Ethical Hacking - MAC Spoofing - ethical hacking tutorials
What is MAC Spoofing ?
What is MAC Spoofing in Tamil
MAC Spoofing
Learn Ethical Hacking - Ethical Hacking tutorial - MAC Spoofing - Ethical Hacking examples - Ethical Hacking programs
- Sending the same MAC Address like the actual user and spoof the network is called as MAC spoofing. The destination will think that, the request is genuine but the request is from the attacker. He used the same MAC address as the original user.
- It is a falcification of network device within a computer network.
- How the attackers are doing this falcification: This technique can be very effective especially if there is a MAC filtering rule to allow only traffic from certain MAC addresses so you will need to discover which MAC address you need to set in order to obtain results.
Learn Ethical Hacking - Ethical Hacking tutorial - MAC Address Spoofing - Ethical Hacking examples - Ethical Hacking programs
- This Spoofing happens in several Ways
- A MAC address change
- MAC Address Randomization
- To set a different manufacturer’s MAC Address
- To set a new MAC Address without changing the manufacturer and subsequent automatic activation
What is MAC Address
- MAC address is nothing but the physical address of the computer. We have seen in my previous article on “How to find the MAC address”.
Learn Ethical Hacking - Ethical Hacking tutorial - Spoof MAC Address - Ethical Hacking examples - Ethical Hacking programs
- Click on the bottom right side of your desktop to find the LAN or wifi connectivity. Click on “Properties”
Learn Ethical Hacking - Ethical Hacking tutorial - What is MAC Spoofing - Ethical Hacking examples - Ethical Hacking programs
- The following image contains the computer configuration
- SSID : JVLKITA_2.4G
- Protocol : 802.11n
- Security type : WPA2-Personal
- Network band : 2.4 GHz
- Network channel : 1
- IPv4 address : 192.168.0.120
- IPv4 DNS servers : 192.168.0.1
- Manufacturer : Intel Corporation
- Description : Intel(R) Centrino(R) Advanced-N 6205
- Driver version : 15.16.0.2
- Physical address (MAC) : 6C-88-14-21-BA-10
Learn Ethical Hacking - Ethical Hacking tutorial - Address Spoofing - Ethical Hacking examples - Ethical Hacking programs
- The physical address or MAC address loaded on the network interface card is 6C-88-14-21-BA-10.
- Goto google and search for “MAC address changer” you can download the MAC changer application. Download one of the MAC.
Learn Ethical Hacking - Ethical Hacking tutorial - How to Spoof MAC Address - Ethical Hacking examples - Ethical Hacking programs
- Now lets see how the MAC address can be changed using MAC spoofing software.
Learn Ethical Hacking - Ethical Hacking tutorial - MAC Spoofing Attack - Ethical Hacking examples - Ethical Hacking programs
- The Actual Mac Address of the device is 6C-88-14-21-BA-10.
- Now click the “Random MAC Address” button to randomized the mac address.
Learn Ethical Hacking - Ethical Hacking tutorial - Internet Spoofing - Ethical Hacking examples - Ethical Hacking programs
- MAC Address can be restored by clicking the “Restore Original” button and you will get back your original IP Address.
- Then The MAC Address is changed from 6C-88-14-21-BA-10 to 02-42-25-FA-BB-6B
Learn Ethical Hacking - Ethical Hacking tutorial - MAC Spoofing Windows - Ethical Hacking examples - Ethical Hacking programs
- Now checking your mac address
Learn Ethical Hacking - Ethical Hacking tutorial - How to Change MAC Address - Ethical Hacking examples - Ethical Hacking programs
- The above result shows the mac address is changed.
Advantages of MAC Spoofing:
- People use MAC spoofing to reroute network traffic, for good reasons also:
- Mac spoofing is necessary for redirecting network traffic in penetration testing.
- Some of the free wifi connections identify our mac address using mac filtering in the case we can use MAC Spoofing for identity protection.
- Many free wifi companies track try to keep track of users by recording the MAC address. Randomizing the mac address may help to prevent this type of tracking.