Security Basics mailing list archives

RE: Ethernet MAC address spoofing


From: "Pablo Hauser" <pablohauser () yahoo com ar>
Date: Fri, 14 Oct 2005 09:08:08 -0300

In WIN you can perform MAC Spoofing by opening REGEDT32 and:

- HKLM\System\CurrentControlSet\Control\Class
- Look for xxxxx972 in the first group
- Look for your interface driver's data
- Create a new string value 'NetworkAddress'
- Put the new MAC. Go.
 
__________________________________________________

Pablo D. Hauser | pH

www.securearg.net
Secure from the source


-----Mensaje original-----
De: Matteo Vadagnini [mailto:tovaldez () katamail com] 
Enviado el: Lunes, 10 de Octubre de 2005 13:51
Para: security-basics () securityfocus com
Asunto: Ethernet MAC address spoofing

Hi to everyone.
As you know many OS permit to modify Ethernet MAC address "on the fly"
(Unix most of all through "ifconfig", but also Windows with third party
software).
My asks are:
-Where this modified address is exactly stored? (in the kernel memory
area?)
-Is it possible to change the MAC address of a wireless NIC, and which
security issues introduce this possibility?

Thanks for the answers to my curiosity.

references to documentation is well appreciated.

Mat



        

        
                
___________________________________________________________ 
1GB gratis, Antivirus y Antispam 
Correo Yahoo!, el mejor correo web del mundo 
http://correo.yahoo.com.ar 


Current thread: