Skip to main content

Hide MAC Address And Become Untraceable (MAC address spoofing)


Tools Used:- Macchanger

What is Mac address? 

A MAC address (media access control address) is a unique identifier assigned to network interfaces for communications on the physical network segment. Every computer device has a different MAC address. The MAC address is a built-in all computer device when it is created. When the computer starts, the operating system reads from the hardware device. When you are connected to the wireless network, it sends packets to you and then your computer converts this information to websites, movies, images, etc. Imagine that two computers are connected to the wireless network, the first computer wants website google.com, and the second computer wants amazon.com, the network sends packets to these computers, but how do these computers know what packets ignore and what packets to receive? Computers identify packets to receive or ignore by MAC address when the network is sending a packet to the computer, it also writes in a packet the MAC address of the computer it is sending. that is the way how wireless networks and computers are connecting each other.

How to hide MAC address?
In hacking, the most important thing is to be untraceable. To be able to hack something is nothing without hiding your identity. Even tho it seems impossible to change the Mac address since the computer reads it from hardware, we can do it by changing information in  RAM. When the computer starts, MAC address loads in RAM and we going to change already loaded MAC address. So, when anybody changes their MAC address, people trying to trace hacker will find hackers fake MAC address and they will not be able to trace a hacker.

Change MAC address in Kali

Kali has a preinstalled program called “macchanger” which lets us change loaded MAC address in RAM.  We need to stop our wireless card to change the MAC address. Type in “ifconfig wlan0 down”. The ifconfig is a program, wlan0 is our wireless card and the down is action what we want to do. So, this command will stop every wireless service and it is necessary to stop network card before changing the MAC address. We can change MAC address and select random address by entering “macchanger –random wlan0”.macchanger is a program name, random is an option and wlan0 is wireless card.
It shows you what was the permanent (built-in in network card) MAC address and its corporation in brackets, and down it shows that there is a new MAC address which does not have a corporation.
For more options and more help with macchanger can always look the help menu as more options are available with macchanger. The command for help is "macchanger --help"

Change MAC address in Windows

Step1:  Go to Control Panel->Network and Internet->Network and Sharing Center, and then click on Manage Network Connections or Change adapter settings.
Step2: On the General or Networking tab, click the Configure button.
Step3: Now click on the Advanced tab and click on the Locally Administered Address property or the Network Address property.
By default, the Not Present value is selected. Go ahead and click on the Value radio button and enter a new MAC address. The MAC address is a combination of 6 pairs of numbers and characters, enter the MAC address without the dashes.
You can go to the command prompt and type in IPCONFIG /ALL to check that the MAC address has been changed. Go ahead and restart the computer in order for the changes to take effect.

Comments

Popular posts from this blog

Making Own Dictionary Using Crunch Commands For Dictionary Attack (Kali linux Tool)

Making own dictionary from words not listed in the normal English dictionary can be helpful specially for people who want to crack passwords based on some person's name, surname or native language words( Example Nepali word, Hindi Word etc). Since most of the word list that are used to hack into a system or crack passwords contain words from English dictionary, passwords such as name of person, surname of person, pet-name and specially words of native language aren't included in that word list as they aren't defined in the English dictionary. This is one the most crucial drawback of dictionary attack. Apart from selective words problem, dictionary attacks usually take lot of time cause they attempt all the words present in the word-list as passwords to crack the authentication system. If we make our own dictionary then it will also help in saving time. But making our own dictionary can only be helpful to only those people who have a hint to what the password might be an...

Wireless /Wifi(WEP/WPA/WPA2) Password Cracking Using Dictionary Attack With Aircrack-ng (Kali Linux)

Tools Used:-Aircrack-ng In the present context of networking, WEP is not used cause it is the weakest and easy to crack through the network. WEP/WPA2 are the most used encryption tools to secure the wireless connection.   The most common way of getting past or cracking through WEP and WPA secured wireless connection is through the use of captured handshake. When you want to hack wifi, you need to capture “handshake”. The handshake is the connection of personal computer and wireless network, it is when network packet and personal computer packets meet each other. If you capture handshake then with a handshake you do not need to be in wifi range anymore, you can hack password with handshake and wifi name. Now you need to capture all the packets that are sent through the wifi router and all personal computers in the network . Step1: airmon-ng  This step is done before anything else is done in order to know your wifi interface name. Check the running process and  ...

SQL Injection Attack Using JSQL Injection Tool

JSQL is a lightweight application that is inbuilt in kali linux but it is  open source and platform independent  (Windows, Linux, Mac OS X, Solaris).   used to find database information from a distant server. This is another injection tool just like SQLMAP but is a lot more user friendly cause SQLMAP is command line based whereas JSQL is Graphical User Interface(GUI) Based. If you guys haven't seen the article and tutorial on SQLMAP then click here . JSQL is more convenient and more easier to use as no commands will be used to perform injection.  As JSQL is platform independent interested people can download it in their respective platform or can use it easily if they are using kali linux. In this tutorial i am going to use kali linux and JSQL is already installed in kali linux. JSQL is under Application-> Database Assessment-> JSQL Injection .   First thing that we will require is the url of the website that we want to hack...