Change/Hide MAC Address.

oggward

Carder
Messages
49
Reaction score
21
Points
8
*You can get a new IP address lease from DHCP server by changing MAC address.

*If your original MAC address is revealed, an hacker can use it to impersonate you!

*If you want to access a network, which limits access based on MAC address, from another machine then you can change MAC address to the one for which you have access.

*Your ISP uses MAC address to identify or authenticate your Internet connection



Download---->

http://www.mediafire.com/?w7gq0xpquzckb8m


----------------------------------------------------------
AhnLab-V3 2011.09.29.02 2011.09.29 -
AntiVir 7.11.15.84 2011.09.30 -
Antiy-AVL 2.0.3.7 2011.09.30 -
Avast 6.0.1289.0 2011.09.30 -
AVG 10.0.0.1190 2011.09.30 -
BitDefender 7.2 2011.09.30 -
ByteHero 1.0.0.1 2011.09.23 -
CAT-QuickHeal 11.00 2011.09.30 -
ClamAV 0.97.0.0 2011.09.30 -
Commtouch 5.3.2.6 2011.09.30 -
Comodo 10294 2011.09.30 -
Emsisoft 5.1.0.11 2011.09.30 -
eSafe 7.0.17.0 2011.09.27 -
eTrust-Vet 36.1.8590 2011.09.30 -
F-Prot 4.6.2.117 2011.09.29 -
F-Secure 9.0.16440.0 2011.09.30 -
Fortinet 4.3.370.0 2011.09.30 -
GData 22 2011.09.30 -
Ikarus T3.1.1.107.0 2011.09.30 -
Jiangmin 13.0.900 2011.09.30 -
K7AntiVirus 9.113.5224 2011.09.30 -
Kaspersky 9.0.0.837 2011.09.30 -
McAfee 5.400.0.1158 2011.09.30 -
McAfee-GW-Edition 2010.1D 2011.09.30 -
Microsoft 1.7702 2011.09.30 -
NOD32 6507 2011.09.30 -
Norman 6.07.11 2011.09.30 -
nProtect 2011-09-30.01 2011.09.30 -
Panda 10.0.3.5 2011.09.30 -
PCTools 8.0.0.5 2011.09.30 -
Prevx 3.0 2011.09.30 -
Rising 23.77.04.01 2011.09.30 -
Sophos 4.69.0 2011.09.30 -
SUPERAntiSpyware 4.40.0.1006 2011.09.30 -
Symantec 20111.2.0.82 2011.09.30 -
TheHacker 6.7.0.1.315 2011.09.30 -
TrendMicro 9.500.0.1008 2011.09.30 -
TrendMicro-HouseCall 9.500.0.1008 2011.09.30 -
VIPRE 10626 2011.09.30 -
ViRobot 2011.9.30.4697 2011.09.30 -
VirusBuster 14.0.242.0 2011.09.30 -
 

What is a MAC address and how is it related to your anonymity?​

Reading materials on the web about the MAC address, you can find a lot of statements that the MAC address does not affect anonymity, that it is impossible to calculate a person from it, you can not track his activity, you can not determine his location…

These are all myths, and I will try to debunk them, but let's start with the theory. If you have read my publications, in particular the Chapter on VPNs, you are well aware that the exchange of information on the Internet is due to IP addresses.

Your Wi-Fi router has an IP address, from which it sends data to the IP address of the website server, and the site returns a response to the router's IP address. Further, the Wi-Fi router should exchange data with the devices connected to it, but how to do this?

Imagine that a packet of information was sent from the site server and it reached the router via a fiber-optic cable – how should the router understand which device to transmit it to? How does the router distinguish between connected devices in General?

And then the MAC address comes into play-the unique identifier of each device that has access to the network. It consists of six pairs of letters/numbers (a six-byte number), where information about the manufacturer (the first three highest bytes) and the network device model is encrypted. You can determine the device manufacturer by MAC address, for example, on this site. The MAC address is also called a physical address, since it is written in the device itself, and is not assigned virtually like an IP address.

2018-11-20_14-40-10.png

Frankly, this is a very simplified model that will not stand up to criticism from colleagues, but it perfectly reveals the role of the MAC address for an unskilled user.

So, all devices connected to the network have a MAC address, but it is not transmitted further than the router, since data is exchanged on the Internet based on IP addresses. That's right, you have a question: what is the danger of a MAC address, then?

The danger is that when the Wi-Fi module is turned on, any of your devices, be it a laptop, tablet or phone, reveals the MAC address to everyone who wants to get it. This is publicly available information, which, unfortunately, cannot be hidden without refusing to use the Wi-Fi module in your device.

Disabling the Wi-Fi module stops the multicast distribution of information about your MAC address, just as disabling Bluetooth stops the multicast distribution of Bluetooth-ID.

Let's say you are sitting in a cafe and want to find out the IP addresses of everyone sitting in the same place with you, but no matter how hard you try, you will not succeed. You can find out the phone numbers of other guests using special equipment, which is prohibited in most countries and is mainly used by law enforcement agencies. But you can find out MAC addresses without any problems by simply scanning the perimeter from a device that has Wi-Fi.

Some systems for analyzing visitors in resort towns are built on this basis. Sensors are installed in shopping centers, hotels, and entertainment venues.as a result, information is collected about how long, how often, and what places the user has visited.

Such systems are available in large shopping centers, and they track which stores within the shopping center and how long users visit. the data obtained allows you to build popular routes, collect other statistics in the form of time and regularity of visits. As you might have guessed, your main bug is a smartphone with an activated Wi-Fi module.

Based on the MAC address, marketers try to assess the financial condition of the tracked user. The owner of an Apple phone is highly likely to be better off than the owner of a Meizu phone.

And if you are seriously angry, you can attract a specialist and turn your Wi-Fi into a trap that will start recording traffic, use man-in-the-middle attacks and DNS spoofing, thereby you can calculate the neighbor and get access to his personal data. But I got carried away...

Some countries have systems that search for criminals based on MAC address analysis. Let's imagine a situation: a hacker connected to a public Wi-Fi router in a city Park and committed a bad act. He was using a VPN, but the real IP address was established using the connection mapping method.

So law enforcement agencies went to the Wi-Fi router in the Park, used by the criminal to access the network, and received the MAC address of the attacker's computer, preserved in the logs of the router. Forensic experts seize Wi-Fi routers-this is a regular practice, and in some cases they manage to get information about the MAC addresses of devices that were connected to it.

At the same time, the data of mobile operators was checked, whether the criminal was using a mobile phone at that moment. But the hacker prudently turned off his mobile phone before entering the Park.

There was only one clue left the MAC address. The extracted Mac address of the hacker was added to the search system. The criminal lay low, but a month later, in another Park, he turned on his laptop and it was immediately identified by the system, which detected the desired MAC address.

Sometimes the MAC address is used by the software as one of the components for generating the HWID – a unique identifier of the computer, thanks to which this computer can always be recognized.

I think I've covered enough about the MAC address for the introductory Chapter, but in the next Chapter, we'll talk about how to use the MAC address to determine the location of the device owner with an accuracy of 10 meters.
 
Top