Jump to content

Search the Community

Showing results for tags 'MAC Address'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 7 results

  1. Good afternoon, I am working on a project to see if it is possible to record the mac addresses that appear in the recon mode or devices that connect to the wifi pineapple network. Is this possible? if so please let me to the right direction to perform this solution. Thanks,
  2. As the title says I'm tinkering with Mac Addresses. I'm writing a simple python script that just takes in a Mac Address as a string and tries to figure out as much information about the device given nothing but that address (not even network access). However, I'm not sure what all that Mac can tell me or how to determine it. I know Mac Addresses can be spoofed. I know that the first 3 octets usually represent the OUI (Organizational Unique Identifier) but beyond that what can a Mac Address tell me? What other useful information can I extract? (any details or resources about how wo
  3. As the title says i would like to learn to change/spoof my MAC Address, I changed my network cards Locally Administered MAC Address but this did not work as after a restart to make the changes set in i checked my modem-router and it showed that my MAC Address was still the hardwares value rather than the new one i set. If i did someone wrong please let me know, if there is something else i can try im all ears. All help is greatly appreciated.
  4. Got a question im wondering about. Lest say i plug a Turtle on an Enterprise Network. The kind that have Active Directory and Cisco Routers, That filter devices by Mac address and not allowing machines that are not approved to connect and set off Unwanted Alarms. Will a Turtle survive or become Turtle soup?! I didn't undertood exactly the way it work. Does it have its own nic to get an ip and create vpn or share the ip of the machine and create vpn with that machine. In an enterprise Network its better to use 3G Turtle right? If i don't have outside networ
  5. Could someone please explain this? I don't get why the names of the networks will all show up but not the MAC addresses. And why can't I scroll through kismet individually as opposed to the whole linux command line.
  6. Hello, I'd like to hide original pineapple mac addresses, even after a reboot. Of course, by defaut eth0, wlan0 and br-lan have the same mac address (00:13:37:A5:0F:01). So I added in /etc/init.d/network, in start() function : macchanger --mac=01:02:03:04:05:06 eth0 macchanger --mac=01:02:03:04:05:06 wlan0 ...where 01:02:03:04:05:06 is the new mac address I chose. At reboot, the eth0 and br-lan interfaces are well configured, with the 01:02:03:04:05:06 mac address. But the wlan0 interface keeps it's original mac address (00:13:37:A5:0F:01). :( So I tried to fix the wlan0 mac address
  7. The instructions in the manual are straight forward (RTFM), however what is the format for the MAC address when you enter it as a Client Blacklist? With the colons, dashes or none? And is there another way to list them via SSH, etc.?
×
×
  • Create New...