Security Basics mailing list archives
RE: Ethernet MAC address spoofing
From: "Pablo Hauser" <pablohauser () yahoo com ar>
Date: Fri, 14 Oct 2005 09:08:08 -0300
In WIN you can perform MAC Spoofing by opening REGEDT32 and: - HKLM\System\CurrentControlSet\Control\Class - Look for xxxxx972 in the first group - Look for your interface driver's data - Create a new string value 'NetworkAddress' - Put the new MAC. Go. __________________________________________________ Pablo D. Hauser | pH www.securearg.net Secure from the source -----Mensaje original----- De: Matteo Vadagnini [mailto:tovaldez () katamail com] Enviado el: Lunes, 10 de Octubre de 2005 13:51 Para: security-basics () securityfocus com Asunto: Ethernet MAC address spoofing Hi to everyone. As you know many OS permit to modify Ethernet MAC address "on the fly" (Unix most of all through "ifconfig", but also Windows with third party software). My asks are: -Where this modified address is exactly stored? (in the kernel memory area?) -Is it possible to change the MAC address of a wireless NIC, and which security issues introduce this possibility? Thanks for the answers to my curiosity. references to documentation is well appreciated. Mat ___________________________________________________________ 1GB gratis, Antivirus y Antispam Correo Yahoo!, el mejor correo web del mundo http://correo.yahoo.com.ar
Current thread:
- Ethernet MAC address spoofing Matteo Vadagnini (Oct 11)
- RE: Ethernet MAC address spoofing Pablo Hauser (Oct 14)