Mac address spoofing in linux. | extrovert.dev -->

Mac address spoofing in linux.

Mac address spoofing in linux.
Monday, October 23, 2017






One of the most simple ways to close a network is to configure your AP to allow connections only from specific wireless network cards.

Each network card has a Mac address just like ethernetcards ,and every Mac address in unique.

Some APs allow you to specify  a list of legitimate Mac address. If a machine attempts to join the network with a a trusted Mac address, it can connect; otherwise the request is silently ignored.

Each card comes with a Mac address hard coded by the vendor. However an attacker can change it trivially by using the ifconfig command
Gspace# ifconfig wlan0 10:20:30:40:50:60
The attacker needs to know a trusted Mac address. However if she is patient ,she can simply sniff the network and log all Mac addresses that are in use. When one of them stops transmitting for a while,she can steal it and the AP will not be wiser..



0 Response to Mac address spoofing in linux.

Comments are personally moderated by our team. Promotions are not encouraged.

Post a Comment