Mac Spoofing
I REALY don't know why I thought of it, but is there by chance someone who will make a mac spoofing program made for brute forcing a network (just by trying every mac address it can) to get past mac filtering, and to show details of which computers are on a network (idealy without having to actually retain any conection, or, sence I don't see that happening, mearly taking the spot of one of the computers on the network, and scaning which others are there while doing the same once it goes to the next, and to basically conect using a mac address, then using nmap over the network, but going through the dictionary attacks {just using every mac possible}).
I'm also kinda curious if someone could make it be efficient enough for logical use.
ferasdour wrote: I REALY don't know why I thought of it, but is there by chance someone who will make a mac spoofing program made for brute forcing a network (just by trying every mac address it can) to get past mac filtering, and to show details of which computers are on a network (idealy without having to actually retain any conection, or, sence I don't see that happening, mearly taking the spot of one of the computers on the network, and scaning which others are there while doing the same once it goes to the next, and to basically conect using a mac address, then using nmap over the network, but going through the dictionary attacks {just using every mac possible}).
I'm also kinda curious if someone could make it be efficient enough for logical use.
Im not sure I fully understand your questions but ill try to help. I take it your trying to use mac spoofing on a wireless network? If this is the case you shouldn't need a tool like this because you can use kismet or airodump-ng to scan packets in the air and pickup mac addresses associated with each access point. And then you can use macchanger to spoof yr mac and dis-associate a client (or wait for one to get off the acess point) and take there spot. As far as scanning every possible mac address, you should look at cain and abel, since the hosts sniffer does this exactly. Its a program that can scan every host on your network. It gives you a list of there ip's mac address's, and the manufacturer of the device. This is really handy so you can just look and tell if its more likely a router or a computer, etc. It can also help you discover where the devices are physically located. for example if you know in the sales department uses older compaq's and a few popup on the list you can bet that range of ip's is probably located in the sales department, etc. etc. etc.
So in other words there is already a few tools that do this. You should look at cain and abel, and also ettercap.
I already do have cain and able (even though I have yet to get the winpcap stuff to work {not too sure why yet}), and I'm well aquainted with what those programs do. But say you are trying to get into a network that has mac filtering set up (assuming you either have the wep/wpa key if nessisary), and you are trying to get into the network from the outside. just trying each mac you could spoof to get into the network so that you may deside between every one you can find.
there is no real reason for it, I just want to see someone do it. I have a bit more learning to do before I am anywhere near able to do it, im just kinda offering the thought for anyone who may want to try it.
^_^ hehehe
ferasdour wrote: I already do have cain and able (even though I have yet to get the winpcap stuff to work {not too sure why yet}), and I'm well aquainted with what those programs do. But say you are trying to get into a network that has mac filtering set up (assuming you either have the wep/wpa key if nessisary), and you are trying to get into the network from the outside. just trying each mac you could spoof to get into the network so that you may deside between every one you can find.
there is no real reason for it, I just want to see someone do it. I have a bit more learning to do before I am anywhere near able to do it, im just kinda offering the thought for anyone who may want to try it.
^_^ hehehe
ahh lol now i understand ;)
That would be a cool tool but just for the sake of information you dont always need to brute force a mac like this.
For example you are scanning a wireless network and have already cracked the wep key. Now you want to connect but realize that mac address filtering is being used. In my personal experience its best to use airodump to scan the network until you see a wireless client show up on the associated list, copy that down as its an accepted mac address. Now either wait for this person to disconnect or forcefully dis-associate them from the network :D and associate yourself after spoofing your mac.
You dont have a Dell Inspiron D810 do you? Ive read about a couple problems with winpcap on this model. I know it also has trouble working properly with certain other windows drivers :angry:
Infam0us wrote: [quote]ferasdour wrote: I already do have cain and able (even though I have yet to get the winpcap stuff to work {not too sure why yet}), and I'm well aquainted with what those programs do. But say you are trying to get into a network that has mac filtering set up (assuming you either have the wep/wpa key if nessisary), and you are trying to get into the network from the outside. just trying each mac you could spoof to get into the network so that you may deside between every one you can find.
there is no real reason for it, I just want to see someone do it. I have a bit more learning to do before I am anywhere near able to do it, im just kinda offering the thought for anyone who may want to try it.
^_^ hehehe
ahh lol now i understand ;)
That would be a cool tool but just for the sake of information you dont always need to brute force a mac like this.
For example you are scanning a wireless network and have already cracked the wep key. Now you want to connect but realize that mac address filtering is being used. In my personal experience its best to use airodump to scan the network until you see a wireless client show up on the associated list, copy that down as its an accepted mac address. Now either wait for this person to disconnect or forcefully dis-associate them from the network :D and associate yourself after spoofing your mac.
You dont have a Dell Inspiron D810 do you? Ive read about a couple problems with winpcap on this model. I know it also has trouble working properly with certain other windows drivers :angry:[/quote]
no, I have an ibm T23 (running xp).