Questions tagged [mac-spoofing]

59 questions
25
votes
4 answers

Identification of a laptop using a spoofed WiFi MAC address

I own a small coffee shop in a highly-populated area. We've noticed that several computers are connecting to our WiFi network using spoofed MAC addresses (e.g. 11:22:33:44:55:66). Is there any way of identifying these machines? Is there any way to…
Moth Yelby
  • 353
  • 2
  • 6
13
votes
8 answers

Randomizing MAC addresses on bootup

Since it is possible to set custom MAC addresses, wouldn't it make sense to have a new one as often as possible/convenient (i.e. on bootup)? It would seem that is useful to both attacker and victim (harder to log/less problems with undirected…
McEnroe
  • 233
  • 2
  • 6
11
votes
4 answers

How to break MAC address filtering?

If a MAC filter prevents you from connecting to a network, how can you break it or include your device's MAC in that filter?
EHY
  • 185
  • 1
  • 1
  • 9
11
votes
1 answer

Bypassing hidden SSID and MAC filtering "protection"

I was browsing over this question and had some follow up questions from a practical perspective. What tools will show the SSID of an AP with the SSID set to hidden or broadcasting disabled? I have looked at Kismet and similar tools but they don't…
Sonny Ordell
  • 3,476
  • 9
  • 33
  • 56
10
votes
7 answers

How can I restrict access to network data by an unauthorized computer that connects via Ethernet?

I assume I can configure most routers to only assign IP addresses to specific MAC addresses, as is possible with wireless routers. However what if a computer is connected via Ethernet and does not ask for an IP address? What can they skim off the…
Wholemilk
  • 101
  • 1
  • 3
8
votes
4 answers

Security provided through MAC filtering: Wired vs. Wireless Networks

My question refers to the following article on Wikipedia: MAC Filtering. The article states: MAC filtering is not effective control in wireless network as attackers can eavesdrop on wireless transmissions. However MAC filtering is more effective…
Karl Hardr
  • 692
  • 5
  • 12
8
votes
2 answers

What is the best way to protect a captive portal againt MAC spoofing

What is the best way to protect a captive portal againt MAC spoofing? The MAC Address appears one of the only ways to distinguish wireless clients from one another, anything one authenticated client sends can simply be spoofed by a rogue client. The…
Jamie
  • 183
  • 1
  • 9
6
votes
1 answer

Reasons behind MAC Spoofing on a corporate network?

My team is inspecting some MAC Spoofing events that are triggering in our corporate environment. After talking it over with the team, this is the information that we have that is relevant.... The events are being triggered by our client-side…
Ormis
  • 1,940
  • 13
  • 18
5
votes
1 answer

Wireless MAC Address Filtering - Authentication/Association

Can somebody explain to me how a wireless AP denies access to the network if the client does not have the correct MAC Address. Does it not send a probe response when a client has not got a correct MAC. Or when the client tries to authenticate, it…
Mintuz
  • 273
  • 3
  • 5
5
votes
4 answers

Can a website still detect my real MAC address even if I use different virtual machine each time I visit the website?

Suppose I use a proxy and a different virtual machine each time I visit a particular website, will a website still be able to detect my MAC address and/or uniquely identify me? Assume that the website owner does privacy violations like inserting…
5
votes
1 answer

MAC spoof not working?

I have set up our home router to only allow certain MAC addresses to connect. One way to test if the filter is working is to spoof a MAC address not in the list and trying to connect to the router. So I have used macshift already to change my MAC…
Mywiki Witwiki
  • 199
  • 1
  • 1
  • 8
5
votes
3 answers

How can I make it more difficult for a user to create multiple accounts?

I would like to know the best way to increase security on a website so that the a single user can't create multiple accounts. What all of a user can be traced? I'm thinking: IP address Mac address Browser details Computer name and its details I…
adam rai
  • 51
  • 1
  • 2
5
votes
1 answer

How can Port Stealing be used as a MiTM attack?

I read about and tried a lot of MiTM attacks but I just don't get how Port Stealing can be used as a MiTM attack. In my understanding one can "steal" a Port by sending Ethernet Frames faking the victims source MAC-Address with the goal of confusing…
davidb
  • 4,285
  • 3
  • 19
  • 31
4
votes
2 answers

Identify malicious hosts in our network by sending valid domain credentials

We are currently whitelisting the hosts owned by our company on our Cisco switches to prevent private hosts in our network. This works pretty well but someone can still spoof the MAC address of his host. Now we had the idea to create a domain user…
davidb
  • 4,285
  • 3
  • 19
  • 31
4
votes
1 answer

How does Karma's open WiFi network successfully protect its users?

Foreword This question has a lot of build-up, so please scroll down to the bottom if you just want to see the question. Please at least skim the background info, though. Background I ordered a Karma Go hotspot with their "Neverstop" unlimited…
allquixotic
  • 618
  • 1
  • 5
  • 14
1
2 3 4