Macchanger – Manipulate MAC Address of Your Kali Linux
Let’s get started, To become a better Pen-tester, anonymity your self, cover your pentesting action, be undetectable from getting caught. When you noticed word anonymity don’t wondering first complicated things such proxy, vpn or sock whatever. Start from your device, before you wanna do some hack action, cover your Kali Linux a few seconds after it booted.
Is it possible? what I need to do to cover my Kali within a few seconds?
Yes, it is, it was your Media Access Control Address (stands for MAC Address). MAC Address is unique globally identifier to a network devices, it is often referred to as physical address. MAC Address consist of 6 byte binary numbers (48 bits) and written in format like ID:ID:ID:SS:SS:SS. The first 3 bytes are manufacturer ID number which assigned by internet, and the rest 3 bytes are serial number which assigned by the manufacturer.
MAC Address Vs IP Address
MAC Address, as i mentioned earlier it is in other word, your physical identity or supporting for hardware implementation, MAC layer represents layer 2 of the TCP/IP, whereas IP represents layer 3 and it supports software implementation. MAC is manufacturer assigned on every NIC, but doesn’t mean we can not manipulate our MAC Address.How TO Find Your MAC Address
Finding MAC Address is easy, ifconfig command display your network interface and necessary information or ID on a list. Explore yourself!How TO Change MAC Address
Luckily, Kali Linux and major hacking OS has built in tools to accomplished that task, it is “Macchanger“. Macchanger is a GNU/Linux tool for manipulating or changing the MAC Address of network interfaces, as it is called, [MAC]Changer. Macchanger are able to:- Manipulate MAC randomly
- Set specific MAC
- Set MAC of another vendor
- Set different MAC on the same vendor
- Display vendor list
- Display your MAC Address
Lets take a look at macchanger help options display.
Too see list of available vendor and MAC, run the -l options.
Before you set to fake the interface MAC address, make sure to bring it down and run as root user.
- Set MAC randomly:
- Set MAC specifically:
We will get into more detail about wireless hacking series in the upcoming sections. These are the first steps and the foundation in getting all to be ready.
0 Comments