This forum is in archive mode. You will not be able to post new content.

Author Topic: MAC Address Spoofing in Backtrack  (Read 6241 times)

0 Members and 1 Guest are viewing this topic.

Offline parad0x

  • VIP
  • Royal Highness
  • *
  • Posts: 638
  • Cookies: 118
    • View Profile
MAC Address Spoofing in Backtrack
« on: January 10, 2013, 07:46:12 AM »
Well guys,its my first tut I am writing.If you feel I left something,feel free to say. :P In this tut,I'll show you how to spoof MAC address.Before spoofing the MAC address,let us see what  basically a MAC address is.According to wikipedia,
A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. A network node may have multiple NICs and will then have one unique MAC address per NIC.
MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names EUI-48 and EUI-64, in which EUI is an abbreviation for Extended Unique Identifier.


Now,the first question striking your mind would be - If there are any benefits of spoofing or cloning the MAC address or its just a waste of time?
Ans- It has a couple of benefits,both legitimate and non-legitimate uses. Let's discuss both of them,
Non-legitimate: 1.) Taking over another computer’s identity.
2.) An example of an illegitimate use is when an attacker changes the MAC address of his station to enter a target network as an authorized user-taking over a computer’s identity that is authorized to function on the network. With this new identity, an attacker can wreak havoc: for example to launch denial of service attacks, or to bypass access control mechanisms to advance more intrusion. An attacker might choose to change one’s MAC address in an attempt to evade network intrusion detection systems, to become invisible to security measures, allowing more time to act without detection.

Legitimate: 1.)Changing the function of a single computer from a router to computer and back to router through MAC spoofing. If you only have a single public IP, you can only hook up one unit directly (PC or router). If one has two WAN IPs, the MAC address of the two devices must be different.
For whatever reason, if one needs to swap 2 PC's regularly to connect to the cable modem, it would be a lot easier to change the MAC addresses rather than to change the Network Interface Card (NIC). Many cable modem routers have a "Clone MAC Address" feature built-in for this. (In reality, the easiest way to enable two machines to access the same ISP from the same location is to use a cable modem router like LinkSys, which allows multiple MACs to use a single ISP connection.)
2.)A user may wish to legitimately spoof the MAC address of a previous hardware device in order to reacquire connectivity after hardware failure.


How MAC Spoofing is done?
On windows and Unix platform: You can spoof your MAC Address by using SMAC or utilities like libnet.
On linux:You can use macchanger(it comes pre-installed in BackTrack :) ).

Note: This process will work if the machines are located on the same subnet.
Locating the MAC address of a networked computer from Windows:
 
  • Open cmd.
  • Type ping xxx.xxx.xxx.xxx, replacing xxx.xxx.xxx.xxx with the IP address of the computer who's MAC address you want to retrieve
  • After the ping response has finished, type arp -a
  • Under Internet Address, locate the IP address you just pinged. In the same line, the corresponding MAC address is listed under Physical Address
Locating the MAC address of a networked computer from Mac.
All the process is same except open Terminal cause you don't have cmd in Mac.

Now,its time to change your MAC address in BT, I am using BT5 R2.
Step 1:Open Konsole(Terminal) and type ifconfig to see the MAC address of your ethernet card.
The MAC address is the one which is written against HWaddr(Hardware Address.)
To change the MAC address,we have to disable the ethernet first.
Step 2:Type ifconfig eth0 down to disable the ethernet.
So,it totally depends on you whether you want to set your MAC address random or you want to set it to your choice.
If you want to set it fully random,then
Step 3:Type macchanger -r eth0.
It'll look like this,

else,if you want to set it to your wish,then use macchanger -mXX:XX:XX:XX:XX:XX eth0, where XX:XX:XX:XX:XX:XX will be your choice what you want to set but remember you can set X from 0 to f.I have done it like this,

Now we have spoofed our MAC address,its time to enable the eth0.
Step 4:Type ifconfig eth0 up to enable the ethernet.
Now you can see your spoofed MAC address by again typing ifconfig.
It'll look like this,


Hope you liked it.If I am missing somthing,plz let me know.

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: MAC Address Spoofing in Backtrack
« Reply #1 on: January 11, 2013, 01:22:09 AM »
I would like to mention that depending on how you've connected to the internet sometimes simply doing ifconfig eth0 up doesn't necessarily do the trick. For example with networkmanager I wouldn't be able to connect to the internet afterwards until I reconnected to the internet using networkmanager itself. Just wanted to throw that in there.

Nice tut btw  ;D
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: MAC Address Spoofing in Backtrack
« Reply #2 on: January 11, 2013, 04:53:05 AM »
Appreciate the effort you put in writing this.
I always liked low level attacks.

Lol MAC address filtering on wireless networks is a joke.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline parad0x

  • VIP
  • Royal Highness
  • *
  • Posts: 638
  • Cookies: 118
    • View Profile
Re: MAC Address Spoofing in Backtrack
« Reply #3 on: January 11, 2013, 05:21:05 AM »
I would like to mention that depending on how you've connected to the internet sometimes simply doing ifconfig eth0 up doesn't necessarily do the trick. For example with networkmanager I wouldn't be able to connect to the internet afterwards until I reconnected to the internet using networkmanager itself. Just wanted to throw that in there.

Nice tut btw  ;D
I just hate when it requires to connect to net using the Wicd Network manager after changing the MAC address of eth0 but it doesn't take more than 10sec. ;)
Thanks lucid and proxx for that you appreciated my tut. :D

 



Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.