The mac-spoofing tag has no wiki summary.
0
votes
0answers
14 views
Change Mac Address on Wireless NIC [migrated]
Problem
I currently use a Intel(R) Centrino(R) Advanced-N 6230 network adapter, and I need to spoof the mac address in order to test security on my network.
The problem is that the latest driver for ...
1
vote
3answers
261 views
Can a website still detect my real MAC address even if I use different virtual machine each time I visit the website?
Suppose I use a proxy and a different virtual machine each time I visit a particular website, will a website still be able to detect my MAC address and/or uniquely identify me?
Assume that the website ...
-4
votes
1answer
99 views
cant connect to network after spoofing mac [closed]
Just spoofed my mac at my school connected to router got past the fire wall but now I don't have internet access. Can some one help I am using windows 7.
-5
votes
0answers
31 views
MAC osx strange behaviour [closed]
I have a mac desktop that has worked well for years.
Max osx 10.8 lotsa tols and software installed.
Some how a new window has appeared ![enter image description here][1]What is this??
I do have a ...
1
vote
2answers
132 views
What is the best way to protect a captive portal againt MAC spoofing
What is the best way to protect a captive portal againt MAC spoofing?
The MAC Address appears one of the only ways to distinguish wireless clients from one another, anything one authenticated client ...
1
vote
1answer
315 views
MAC spoof not working?
I have set up our home router to only allow certain MAC addresses to connect. One way to test if the filter is working is to spoof a MAC address not in the list and trying to connect to the router. So ...
2
votes
3answers
455 views
How can I make it more difficult for a user to create multiple accounts?
I would like to know the best way to increase security on a website so that the a single user can't create multiple accounts.
What all of a user can be traced? I'm thinking:
IP address
Mac address
...
3
votes
1answer
975 views
Wireless MAC Address Filtering - Authentication/Association
Can somebody explain to me how a wireless AP denies access to the network if the client does not have the correct MAC Address.
Does it not send a probe response when a client has not got a correct ...
11
votes
8answers
713 views
Randomizing MAC addresses on bootup
Since it is possible to set custom MAC addresses, wouldn't it make sense to have a new one as often as possible/convenient (i.e. on bootup)?
It would seem that is useful to both attacker and victim ...
7
votes
6answers
686 views
How can I restrict access to network data by an unauthorized computer that connects via Ethernet?
I assume I can configure most routers to only assign IP addresses to specific MAC addresses, as is possible with wireless routers.
However what if a computer is connected via Ethernet and does not ...
7
votes
1answer
1k views
Bypassing hidden SSID and MAC filtering “protection”
I was browsing over this question and had some follow up questions from a practical perspective.
What tools will show the SSID of an AP with the SSID set to hidden or broadcasting disabled? I have ...
5
votes
1answer
358 views
Reasons behind MAC Spoofing on a corporate network?
My team is inspecting some MAC Spoofing events that are triggering in our corporate environment. After talking it over with the team, this is the information that we have that is relevant....
The ...