![]() Retrieved 5 23, 2015, from StackExchange: Retrieved 5 22, 2015, from Online Tech Tips: Change or Spoof a MAC Address in Windows or OS X. MAC filtering is most beneficial when it is implemented as part of a “Defense in Depth” strategy or “Unified Threat Management” (UTM). Spoofing a MAC address hides the identity of its implementer, which is detrimental to online privacy concerns when used for nefarious purposes therefore, it’s critical to not rely solely on MAC filtering as a security mechanism. MAC filtering has its limitations because it can’t differentiate the legitimacy of Mac addresses, which is why other security mechanisms should be in place. Once a computer goes offline, attackers can impersonate computers using spoofed MAC addresses. MAC spoofing has its many uses, some good, some bad, and is also very easy to implement as seen above. At first launch, the current MAC address is displayed as seen below: Current MAC: The second method used to Spoof a MAC address requires 3 rd party software, which I did not buy, but rather, downloaded a free 14-day trial version. Miguels-Mac-Pro:~ mb$ ifconfig en0 | grep ether I was able to identify my existing mac address as indicated below: The command line method requires knowledge of various commands that will run in the command line. I will first outline the procedure for changing the MAC via the command line. I identified two ways of spoofing a MAC address on an Apple Mac, one by using the command line, and the other by using 3 rd party software called “ WiFiSpoof” for Mac, which costs $9.99. MAC Spoofing also allows an attacker to assume the identity of another authorized device. MAC spoofing is also used to reroute traffic, which could be for both good and bad reasons. MAC spoofing is relatively easy to do and serves many purposes, which includes appearing as a legitimate device on a system for which it is not, tracking avoidance, profiling avoidance, and on wireless access points to provide multiple wireless networks with a single wireless interface. Figure 2 MAC Spoofing Procedure and Analysis
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |