PaPPy Posted October 28, 2019 Share Posted October 28, 2019 I need to get a computers MAC address without logging into it, as the place I am testing uses sticky MAC and I would like to connect my own device but with a cloned MAC of an already authorized MAC address. I see there are implants for sale that do mitm and pcap captures, but that’s overkill for what I am looking for. 1 Quote Link to comment Share on other sites More sharing options...
Bigbiz Posted October 29, 2019 Share Posted October 29, 2019 Sounds like you wnt to do arpspoof. Quote Link to comment Share on other sites More sharing options...
PaPPy Posted October 29, 2019 Author Share Posted October 29, 2019 Correct but without knowing the Mac to spoof, I am SOL. I was looking into installing some router software on a pi that can collect the mac of devices plugged into it. But that only seems to be available for wireless devices Quote Link to comment Share on other sites More sharing options...
PaPPy Posted October 29, 2019 Author Share Posted October 29, 2019 Correct but without knowing the Mac to spoof, I am SOL. I was looking into installing some router software on a pi that can collect the mac of devices plugged into it. But that only seems to be available for wireless devices. I also just picked up the shark jack so I will see what it can do. Some suggestions I have seen is setup a DHCP server or do wireshark/pcap and try to see the mac in the traffic Quote Link to comment Share on other sites More sharing options...
Bigbiz Posted October 30, 2019 Share Posted October 30, 2019 airodump-ng will get MAC addresses. But you need to scan the wifi. But maybe also Kismet. Quote Link to comment Share on other sites More sharing options...
Cap_Sig Posted November 1, 2019 Share Posted November 1, 2019 On 10/28/2019 at 9:45 PM, PaPPy said: I was looking into installing some router software on a pi that can collect the mac of devices plugged into it. You are wanting to do this on wired connections? Quote Link to comment Share on other sites More sharing options...
PaPPy Posted November 1, 2019 Author Share Posted November 1, 2019 correct. But I think the shark jack will work with a new firmware they are releasing Quote Link to comment Share on other sites More sharing options...
chrizree Posted September 23, 2020 Share Posted September 23, 2020 OK, I know this thread is getting full of grayish hair since it's old, but I still want to respond since it can help someone else in the community that is doing some searching in the future. Using a Raspberry Pi to hand out DHCP leases isn't limited to wireless only, but will of course work with wired communication as well. The media/carrier isn't any obstacle here. I use it in different scenarios and my "go to" friend when doing this is dnsmasq. It's easy to set up using a fresh Raspberry Pi OS Lite installation and then just add dnsmasq (plus the configuration needed that comes with it). With that setup you will see the leases handed out in /var/lib/misc/dnsmasq.leases that also contains client device MAC addresses. The Shark Jack is also possible to use if in possession of such a device. I have a payload that does the same (ish) on my GitHub repo. https://github.com/chrizree/Hak5-SharkJack-MAC-pilfer-and-nmap-scanner Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.