Questions tagged [mac-address]

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. A network node may have multiple NICs and will then have one unique MAC address per NIC.

MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names EUI-48 and EUI-64, in which EUI is an acronym for Extended Unique Identifier.

185 questions
5
votes
2 answers

Unknown MAC in network

A few days ago, I noticed an unknown MAC address in the statistics page of my home router. The OUI lookup yields Cisco as manufacturer. However, I don't have such a device in my network -- actually, I wrote down every MAC address, I know. This…
Stefan
  • 151
  • 1
  • 4
5
votes
1 answer

How can Port Stealing be used as a MiTM attack?

I read about and tried a lot of MiTM attacks but I just don't get how Port Stealing can be used as a MiTM attack. In my understanding one can "steal" a Port by sending Ethernet Frames faking the victims source MAC-Address with the goal of confusing…
davidb
  • 4,285
  • 3
  • 19
  • 31
4
votes
1 answer

How does detecting promiscuous mode using an ARP test work?

I have read that we can detect whether a system is running promiscuous mode by sending out an ARP request with a fake broadcast address e.g FF:FF:FF:FF:FF:FE.This will be blocked by all NIC's operating in normal mode but will be allowed by NIC…
faraz khan
  • 329
  • 2
  • 12
4
votes
3 answers

How can spoofing a certain MAC address enable sending probe requests that I was never connected to?

I was wondering how could my computer that uses a spoofed MAC address be sending probe requests for APs that I was never connected to? Note:- The other computer with the original MAC address was shut down.
peter b
  • 51
  • 2
4
votes
5 answers

Is MAC address filtering effective on a wifi router?

I want to improve the security of my home wifi. My neighbor wants to crack my Wi-Fi password with a nutcracker. I tried to activate the protection by MAC address, but now my laptop and smartphone don't have access to the box. Is MAC address…
Belin
  • 77
  • 1
  • 4
4
votes
2 answers

Storing the MAC Address of a computer in Active Directory

I’m considering enabling WoL (Wake on LAN) on the workstations on my network. In order to boot a workstation using WoL I require its MAC address. I could store the MAC address in a database, however I’d much rather store it as an attribute of the…
Fitzroy
  • 141
  • 1
  • 1
  • 4
4
votes
2 answers

In a LAN environment, can you fake the IP address while also being able to receive the response?

Looks like nmap could fake source IP address, and getting a valid response, but only in LAN environment. I'm not sure how it works, here's my thought, You created a packet with fake IP address and a fake MAC address (associated with the fake IP), so…
daisy
  • 1,735
  • 3
  • 25
  • 39
4
votes
2 answers

How can Bank of America tell that I'm logging in on a computer I haven't used with them before?

When you sign into Bank of America for the first time on a computer that you haven't used with them before, they detect this and force you to answer one of your security questions. I think I've seen BoA do this when I sign in under a different…
John
  • 2,242
  • 2
  • 28
  • 45
4
votes
1 answer

What general security issues could arise from using UUID version 1 which exposes the MAC address?

I'm coding GENERIC_WEB_SERVICE, which could potentially be running as multiple instances on multiple machines down the line. I'm using UUIDs as identifiers, and haven't settled yet on whether to use version 1 or version 4. In this case, I have…
Nan L
  • 43
  • 3
4
votes
1 answer

Identifying device based on the MAC address

Suppose we know that MAC address A belongs to a certain device (say an iPhone 5), and MAC address B also belongs to an iPhone 5. If we have a MAC address C which is in between A and B, does this guarantee that C is an iPhone 5 or could it be any…
sciencectn
  • 195
  • 2
  • 7
4
votes
2 answers

Are there security reasons for prohibiting universal mac address modification?

Background In a standard 48-bit MAC address, the 7th (most significant) bit specifies whether it is a universally-administered address (UAA) or a locally-administered address (LAA). If it is 0, then the MAC address is a UAA and the first 24-bits are…
ManRow
  • 401
  • 1
  • 4
  • 10
4
votes
3 answers

Smart Lightbulb Using Common IRC port found in NMAP - anything to worry about?

UPDATE: Looking at the product again, I don't think this even has built in Wi-Fi (it uses bluetooth for the connection). I don't know what I am looking for here in Wireshark, but I added the host 192.168.40.59 and ran it for about 15 seconds and…
SBB
  • 175
  • 2
  • 6
4
votes
2 answers

Is another MAC address generated when a wireless is created using the same device for LAN?

I notice that the devices listed on the wireless system listed a MAC address that is supposed to be the router but it is not the same # that is on the router case. It differs by one one digit, *.98.65 vs *.98.66. Is another MAC address generated…
Gary
  • 41
  • 1
  • 1
  • 2
3
votes
2 answers

Is there any way to determine the location of a laptop based on its MAC address or serial number?

If I have the MAC address and S/N of a Lenovo 3000 Laptop, is there some way for me to find exact street location of this laptop ? This machine was stolen from me last year and was my back up machine . Contained all my personal info prior to 2009,…
user77141
  • 41
  • 2
3
votes
2 answers

Can 2 devices have same host-name on same network?

I can see one unknown android device on my network, but it has same host-name as my android device. QUESTION 1.Is this possible that on same network two different devices can have same host-name ? 2.Is someone spoofing my device and accessing my…
vivi
  • 33
  • 1
  • 1
  • 4
1 2
3
12 13