Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: MAC address spoofing - conflict?
From: Pieter Danhieux <opr () bsdaemon be>
Date: Mon, 14 Aug 2006 19:30:40 +0200 (CEST)

Flail,

if you spoof the MAC, there are several options:
- you ask IP through DHCP -> dhcp server could refuse giving another IP if the MAC is still active. Depends on the implementation
- you set an IP -> if you choose the SAME ip, this will cause problems
-> if you choose another ip, you won't see any problems. All packets for the authorized client, are going to be discarded by your IP stack, and all your packets, by his IP stack.

hope this helps.


On Mon, 14 Aug 2006 penetrationtestmail () gmail com wrote:

Hi,

Let's say you're wardriving, and you find an open network which has MAC address filtering enabled. There is one active client on 
the network. You insert BackTrack, start Kismet and find out the client's MAC address. Then, you change your MAC address to mimic the 
client's, and connect to the network.

What happens? Do you kick the other client off, or do both clients conflict with each other because their MAC addresses are the 
same? Or does something else happen? I'm sorry I can't check this at the moment, but I do not have a wireless network 
to test it on.

Thanks in advance,

Flail

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault