Search the Community
Showing results for tags 'mac address'.
Found 3 results
Good afternoon, I am working on a project to see if it is possible to record the mac addresses that appear in the recon mode or devices that connect to the wifi pineapple network. Is this possible? if so please let me to the right direction to perform this solution. Thanks,
As the title says I'm tinkering with Mac Addresses. I'm writing a simple python script that just takes in a Mac Address as a string and tries to figure out as much information about the device given nothing but that address (not even network access). However, I'm not sure what all that Mac can tell me or how to determine it. I know Mac Addresses can be spoofed. I know that the first 3 octets usually represent the OUI (Organizational Unique Identifier) but beyond that what can a Mac Address tell me? What other useful information can I extract? (any details or resources about how would be nice too) Thanks in advance.
Got a question im wondering about. Lest say i plug a Turtle on an Enterprise Network. The kind that have Active Directory and Cisco Routers, That filter devices by Mac address and not allowing machines that are not approved to connect and set off Unwanted Alarms. Will a Turtle survive or become Turtle soup?! I didn't undertood exactly the way it work. Does it have its own nic to get an ip and create vpn or share the ip of the machine and create vpn with that machine. In an enterprise Network its better to use 3G Turtle right? If i don't have outside network or its filtered. If the Turtle SD does have a nic and wont work(get blocked).