Mac Spoofing

Q&A, advice, reviews, and news about the computers, phones, TVs, stereos, and pretty much anything else that can't be easily whittled out of a stick or chipped out of stone.
Locked
cjmcrae
Redshirt
Posts: 2
Joined: Tue Apr 05, 2005 1:25 pm
Contact:

Mac Spoofing

Post by cjmcrae » Tue Apr 05, 2005 6:24 pm

How would I go about looking into mac Address spoofing so I can learn to detect a mac address that is currently being spooffed. I want to learn how to protect my wep encrepted LAN...
Chris J McRae

adamjaskie
Redshirt
Posts: 1114
Joined: Sat Feb 15, 2003 12:37 pm
Location: Ann Arbor, Michigan
Contact:

Post by adamjaskie » Tue Apr 05, 2005 6:47 pm

There is no way to "detect" a spoofed MAC address.
There ought to be limits to freedom. - George W. Bush

There is danger from all men. The only maxim of a free government ought to be to trust no man living with power to endanger the public liberty. - John Adams

They who would give up an essential liberty for temporary security, deserve neither liberty or security. - Benjamin Franklin

User avatar
Zaph
Redshirt
Posts: 599
Joined: Tue Jan 27, 2004 12:12 am
Location: Columbus, OH

Post by Zaph » Tue Apr 05, 2005 7:19 pm

Use WPA.

-Zaph
I swear to god I am surrounded by stupid!

Kuronekosama
Redshirt
Posts: 1091
Joined: Thu Feb 20, 2003 6:26 pm

Post by Kuronekosama » Tue Apr 05, 2005 9:02 pm

If someone wants to break your wep, consider it broken. Readily available free software can crack WEP in a matter of minutes. Wireless packet sniffers can then detect MAC addresses and that's all she wrote. WEP by itself my keep random lazy people from latching on to your network, but it will not hold up to a determined entry.




[quote="Zaph";p="476679"]Use WPA.

-Zaph[/quote]
Crazy with a capital psycho.

User avatar
Infin8Cyn
Redshirt
Posts: 6309
Joined: Tue Apr 29, 2003 10:02 pm
Real Name: James
Gender: Male
Location: Albuquerque, New Mexico
Contact:

Post by Infin8Cyn » Tue Apr 05, 2005 10:11 pm

In fact, The FBI demonstrated publicly (that looks spelled wrong...) today that they can break a 128bit WEP key in under 3 minutes using simple tools found commonly on the web.

Just wait til someone releases an all-in-wonder program for the script kidddies. No one will be safe.
Image

pc486
Redshirt
Posts: 532
Joined: Fri Jul 09, 2004 1:48 am

Post by pc486 » Wed Apr 06, 2005 5:48 am

There are ways to detect MAC spoofing, promiscuous mode, IP spoofing, and other questionable pratices but, like what others have stated, do not depend on WEP to keep yourself secure. See one of my earlier posts describing one way secure a wireless network.

Locked

Who is online

Users browsing this forum: No registered users and 1 guest