Hacklog Volume 1 Anonymity: it security & Ethical Hacking Handbook



Download 2,32 Mb.
Pdf ko'rish
bet4/57
Sana01.01.2022
Hajmi2,32 Mb.
#289651
1   2   3   4   5   6   7   8   9   ...   57
Bog'liq
Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook

hexadecimal characters,  as  mentioned  above,  separated  by  colons.  In  our  case,


the MAC Address will be 61:a8:5d:53:b1:b8.
2.1.2 MAC Spoofing
Fortunately, in (almost) all cases, we can hide our MAC Address – doing the
MAC Spoofing in IT jargon – in a very easy and effortless way. On GNU/Linux,
you just have to execute a couple of commands from the terminal:
$ ip link set dev {interface} down
$ ip link set dev {interface} address 00:00:00:00:00:01
$ ip link set dev {interface} up
Please  note  that  when  you  set  this  MAC  Address,  your  computer  won’t  be
able  to  access  the  net  anymore.  You’ll  have  to  generate  a  valid  MAC  Address,
but I won’t cover this here, due to the complexity of the topic
[3]
. You can restart
your network manager using the command:
$ service network-manager restart
Instead,  we’ll  use  a  tool  available  in  most  of  the  GNU/Linux  distros
repositories  to  generate  a  random  MAC  Address.  This  program  is  macchanger
and you have to install it first. In order to install it, use the command:
$ apt-get install macchanger
You  will  be  prompted  to  change  your  MAC  Address  immediately.  If  you
select No, you can do it anyway using three commands:
$ ifconfig {interface} down
$ macchanger -r {interface}
$ ifconfig {interface} up
On  Linux,  the  ifconfig  command  allows  you  to  check  your  configurations
and control your  network interfaces. As  you have seen,  with {interface} down,
you told your network adapter (in this example identified as eth0) to shut off. In
this  way,  you  can  use  the  macchanger  command  to  generate  a  random  value


(using  the  -r  parameter)  and  apply  it  to  the  eth0  network  adapter.  Once  you
complete  these  steps,  reactivate  your  adapter  using  the  ifconfig  {interface}  up
command.  Feel  free  to  replace  the  ifconfig  command  with  the  newer  ip
(iproute2)  one.  In  case  of  connectivity  issues,  you  can  also  restart  using  the
command:
$ service network-manager restart
Although this operation is quite easy, you can find different scripts online to
automatize the entire process. Here are some:

SpoofMAC (
https://github.com/feross/SpoofMAC
)

spoof (
https://github.com/feross/spoof
)
In  the  Windows  environment  (Figure  2),  you  can  choose  among  different
options,  such  as  directly  changing  the  settings  through  the  following  path:
Control  Panel  ->  System  ->  Hardware  ->  Device  Management  ->  Network
Adapters -> Adapter  name -> *right-click*  -> Properties ->  Advanced -> Net
Address -> Value:


Figure 2: here you can change the vaule on Windows OS.
NB:  this  feature  may  be  missing  on  some  network  adapters,  because  it  is
made  available  at  the  discretion  of  the  manufacturers  and  according  to  the
existing drivers.
However, the above feature can be used through many tools available online.
If you have some spare time, you may want to try one of the following:

MacMACs  (
https://www.irongeek.com/i.php?page=security/madmacs-
mac-spoofer
)

     
Win7 MAC Address Changer (
http://www.zokali.com/win7-mac-address-
changer
)

Technitium MAC Address Changer (
https://technitium.com/tmac/
)

Change MAC Address (
http://lizardsystems.com/change-mac-address/
)

mac-spoofer (
https://github.com/angusshire/mac-spoofer
)
On macOS, changing the MAC Address of an Ethernet network adapter is a
relatively easy task. You only have to run the following commands:
$ sudo ifconfig en0 ether aa:bb:cc:dd:ee:ff
$ sudo ifconfig en0 lladdr 00:11:22:33:44:55
When it comes to a WiFi adapter, things get more complex. In this case, you
have  to  patch  your  kernel
[4]
,  but  you  should  try  it  only  if  you  feel  confident
enough with the Apple world.
If such practice is too complicated for you, but you still wish to work in the
Mac OS environment, consider purchasing an external USB device, and you will
be able to do the MAC Spoofing easily, as you’d do with the Ethernet adapter.



Download 2,32 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   57




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish