Well guys,its my first tut I am writing.If you feel I left something,feel free to say.
![Tongue :P](http://ez.feedthetrolls.net/Smileys/default/tongue.gif)
In this tut,I'll show you how to spoof MAC address.Before spoofing the MAC address,let us see what basically a MAC address is.According to wikipedia,
A
Media Access Control address (
MAC address) is a
unique identifier assigned to
network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most
IEEE 802 network technologies, including
Ethernet. Logically, MAC addresses are used in the
Media Access Control protocol sub-layer of the
OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the
burned-in address. It may also be known as an
Ethernet hardware address (
EHA),
hardware address or
physical address. A
network node may have multiple NICs and will then have one unique MAC address per NIC.
MAC addresses are formed according to the rules of one of three numbering name spaces managed by the
Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims
trademarks on the names EUI-48 and EUI-64, in which EUI is an abbreviation for
Extended Unique Identifier.
Now,the first question striking your mind would be - If there are any benefits of spoofing or cloning the MAC address or its just a waste of time?Ans- It has a couple of benefits,both legitimate and non-legitimate uses. Let's discuss both of them,
Non-legitimate: 1.) Taking over another computer’s identity.
2.) An example of an illegitimate use is when an attacker changes the MAC address of his station to enter a target network as an authorized user-taking over a computer’s identity that is authorized to function on the network. With this new identity, an attacker can wreak havoc: for example to launch denial of service attacks, or to bypass access control mechanisms to advance more intrusion. An attacker might choose to change one’s MAC address in an attempt to evade network intrusion detection systems, to become invisible to security measures, allowing more time to act without detection.
Legitimate: 1.)Changing the function of a single computer from a router to computer and back to router through MAC spoofing. If you only have a single public IP, you can only hook up one unit directly (PC or router). If one has two WAN IPs, the MAC address of the two devices must be different.
For whatever reason, if one needs to swap 2 PC's regularly to connect to the cable modem, it would be a lot easier to change the MAC addresses rather than to change the Network Interface Card (NIC). Many cable modem routers have a "Clone MAC Address" feature built-in for this. (In reality, the easiest way to enable two machines to access the same ISP from the same location is to use a cable modem router like LinkSys, which allows multiple MACs to use a single ISP connection.)
2.)A user may wish to legitimately spoof the MAC address of a previous hardware device in order to reacquire connectivity after hardware failure.
How MAC Spoofing is done?On windows and Unix platform: You can spoof your MAC Address by using SMAC or utilities like libnet.
On linux:You can use macchanger(it comes pre-installed in BackTrack
![Smiley :)](http://ez.feedthetrolls.net/Smileys/default/smiley.gif)
).
Note: This process will work if the machines are located on the same subnet.
Locating the MAC address of a networked computer from Windows: - Open cmd.
- Type ping xxx.xxx.xxx.xxx, replacing xxx.xxx.xxx.xxx with the IP address of the computer who's MAC address you want to retrieve
- After the ping response has finished, type arp -a
- Under Internet Address, locate the IP address you just pinged. In the same line, the corresponding MAC address is listed under Physical Address
Locating the MAC address of a networked computer from Mac.
All the process is same except open
Terminal cause you don't have
cmd in Mac.
Now,its time to change your MAC address in BT, I am using BT5 R2.
Step 1:Open Konsole(Terminal) and type
ifconfig to see the MAC address of your ethernet card.
The MAC address is the one which is written against HWaddr(Hardware Address.)
![](http://2.bp.blogspot.com/-J0qhzLcGQco/UO5SS3hhPpI/AAAAAAAAAC0/etGCRtPF_K0/s1600/mac.jpg)
To change the MAC address,we have to disable the ethernet first.
Step 2:Type
ifconfig eth0 down to disable the ethernet.
So,it totally depends on you whether you want to set your MAC address random or you want to set it to your choice.
If you want to set it fully random,then
Step 3:Type
macchanger -r eth0.
It'll look like this,
![](http://2.bp.blogspot.com/-v8IIdjNVFrA/UO5SSXRO_uI/AAAAAAAAACw/L0vZHa9h3X8/s1600/mac1.jpg)
else,if you want to set it to your wish,then use
macchanger -mXX:XX:XX:XX:XX:XX eth0, where XX:XX:XX:XX:XX:XX will be your choice what you want to set but remember you can set X from 0 to f.I have done it like this,
![](http://2.bp.blogspot.com/-IatEwflp8bk/UO5SJ1ikLVI/AAAAAAAAACo/HqSjYd74MPc/s1600/mac3.jpg)
Now we have spoofed our MAC address,its time to enable the eth0.
Step 4:Type
ifconfig eth0 up to enable the ethernet.
Now you can see your spoofed MAC address by again typing
ifconfig.
It'll look like this,
![](http://4.bp.blogspot.com/-T8QXa-1eKgo/UO5SFYZ_YJI/AAAAAAAAACg/1IV9rMmd83I/s1600/mac2.jpg)
Hope you liked it.If I am missing somthing,plz let me know.