• Spoofing a MAC address
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet195/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   191   192   193   194   195   196   197   198   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    What is spoofing?
    Spoofing is just faking the receiver that the address is different. This on a
    whole will not change the system specifications but will show some random
    or manually inputted information to the attacker or forensic specialists.
    Spoofing a MAC address
    a) First of all, before trying to spoof the address you need to know what
    your MAC address is. It differs from system to system. You can even find it
    in the warranty booklet. But as we are geeks, we will use the Linux
    command shell to find the MAC address of the system we are working on.
    Follow along! 
    b) First of all, enter into the Linux command shell and inter the ifconfig
    tool. After successfully starting the ifconfig module enter the below
    command 
    ifconfig mac
    This will display an output that shows you the MAC address of your present
    system. It will also give the manufacturer details along with the network
    packet structure it uses.
    c) Now you need to install a tool called Mac changer that can spoof the
    system address. Install the Macchanger using the following dependency
    injection command 
    wget macchanger
    d) After installing the Mac changer, you are good to go to use the
    commands that will change the system address both randomly and
    manually. We will discuss both of these functionalities in detail below. 
    e) Random MAC address just changes your MAC address into a random
    number that is per listed in the code. 
    f) Custom MAC address will, however, make you change to ur desired
    MAC address using the following command. 


    root @ host : change MAC to as:23:1w:2w:3e
    Whenever you use the changed MAC address there is very little chance of
    being identified or traced. By this, we have explained all the topics that can
    help you deal with maintaining your anonymity while hacking. Before
    ending this chapter, we will have a brief explanation about proxies for a
    better understanding of this topic. 

    Download 6,34 Mb.
    1   ...   191   192   193   194   195   196   197   198   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish