Hackers will just spoof the mac address to retain there anonymity. There never use original mac address and IP address. Step 1: Finding the Device That You Want To Spoof.(wireshark) Spoof the Mac Address To spoof the address go to Control PanelNetwork Connections. Then right click on the connection you want to spoof and select properties. Your Media Access Control address, or MAC address, is a unique 12-character code (for example 00:00:00:00:00:0X) that your device uses to identify itself when connecting to a network. When you register it on My WiFi, your device will automatically connect.
I am going to expose an important topic on hacking knowledge that some of you might know and most of you don’t. When you’re going to hack a computer or server on the Internet, you won’t want your IP address to spill out. That’s because your ISP could easy trace you by two simple information which is the time and IP Address. So you’ll need to use proxy or even chains of proxies to avoid being directly traced by the victim’s firewall. If you think you’re safe hiding behind a proxy server, bad news is most proxy server has logging enabled and your IP address is definitely listed in the log file when you’re connected to it. It is possible that the administrator of the proxy server passes your information to your ISP and you’ll still get caught at the end of the day. Don’t forget, there are still some other important information that can be obtained from an IP Address if a person knows what tools to use. One of it is your network adapter’s MAC address.
Every network card contains a unique code called MAC address that is permanently assigned to it, similarly like every computer requires a unique IP address to be connected to a network. Although these information can be configured to have the same, it would cause conflict and connection problems. To view your network card’s MAC address, just run the command “ipconfig /all” in command prompt and refer to the value of Physical Address.One thing you should know is the MAC address on your computer’s network card will not get passed out to the Internet so there is no way a website or an Internet server can capture this information. Only your Internet Service Provider (ISP) can detect the MAC address of your modem or router. So basically your ISP is capable of tracking your location by your IP address, time and the MAC address of your modem or router.
In another scenario, some people may still be using WEP encryption for their wireless network because some old devices don’t support WPA. WEP encryption is very weak and can be cracked in less than 5 minutes using BackTrack Linux. Most of the time they’d also enable a second line of defense which is the MAC address filtering to only allow authorized devices to connect to their wireless network but they’re wrong. A hacker can easily find out the authorized MAC address, change their network card’s MAC address to the authorized ones and poison the ARP cache to prevent the owner’s machine from connecting to it. Here’s an example of Belkin Play Max F7D4401 v1 router. It has a MAC Address Filtering feature where you can set up a list of allowed clients and use the wireless connection.
Other than that, some time limited shareware such as Hotspot Shield that uses your MAC address to keep track of the free usage. If the trial period has expired or is pending to reset every month, you can easily bypass this restriction by changing your MAC address. I bet by now you should know the power of spoofing your MAC Address. MAC address can actually be changed directly from Windows but the easiest way is to just a free program called Technitium MAC Address Changer.
To change your MAC address, run the program, click the Random MAC Address button followed by the Change Now! button. The update takes effect immediately without a reboot and stays intact even when you boot up the computer tomorrow. To restore back your original MAC address, click the Restore Original button on Technitium MAC Address Changer program.
Download Technitium MAC Address Changer
To manually change your MAC address in Windows 7 without using a third party software, go to Control Panel > System > Device Manager. Expand Network Adapters and double click on the network card that you want to change the MAC address. Go to Advanced tab and look for Network Address in the Property box. Click on it and you can specify your own value with any random 12 characters of letters and numbers.
You might also like:
5 Steps to Investigate and Report Abusive IP Address5 Ways to Protect Your Computer Against NetCut’s ARP Spoofing Attack4 Ways to Edit URLs at Internet Explorer Address Bar History7 SMTP Providers to Hide Sender IP Address in Email HeadersGet SMS Notification when Electricity Power Supply is Restored 3 Comments - Write a Comment
The Technicium Mac address changer has certain restriction in some cases (particularly Wireless connection) such that we should use only ’02’ as fist octet of mac address (as you can see a checkbox in the tool). So, it seems it is not possible to completely spoof your mac address as another PC’s mac address. May be we can play with, by just hiding behind some random mac address.
Replyspoofing the MAC randomly every few minutes may be more useful.
ReplyIf you’re behind a router, your ISP only sees the router’s MAC addy. That’s the one you should change.
Regardless, if you have a home broadband connection, you might have a hard time arguing with your ISP since they tie your IP to the modem id.
Leave a Reply
In 2006, a hacker going by the name 'DerEngel' ('The Angel') wrote a book for respected tech publishers No Starch Press on Hacking the Cable Modem. The book came with a warning: 'The practice of modifying a cable modem violates service agreements, and hackers risk being banned by service providers for life. This book is not intended to be used for stealing Internet service or any other illegal activity.' It was intended, you know, for research. Not for stealing Internet access.
An early review of the book noted this warning didn't seem to fit with the tone of the text, which repeatedly implied 'that uncapping, MAC [Media Access Control] cloning, and evading detection is a noble pursuit.' (Though one section did include 'recommendations to ISP engineers on how to improve their systems to more easily defeat and detect cable modem hackers.')
The feds weren't buying the 'research' angle, either; they were convinced that DerEngel was running the country's largest cable modem hacking operation, showing thousands of people around the country how to get free or higher-speed service from local Internet providers. And they were going to stop it.
Hacking modems
DerEngel was really Ryan Harris, a young Oregon resident. Harris had dropped out of high school at 15, like many disenfranchised geeks. He got his GED instead and attended college for a year, but his computer hacking skills were largely self-taught. Around 2003, he set up TCNiSO.net, a Web-based company devoted to creating 'diagnostic' tools for cable modems.
The tools came in two basic varieties: a packet sniffer dubbed 'CoaxThief' and a MAC address/config file changer for select cable modems. Together, the tools enabled some fairly clever Internet fraud.
Cable Modem Mac Address
To understand how it worked, consider how cable modems function. Cable networks generally use a shared line connecting many homes in a single neighborhood, as opposed to DSL, where each home's line runs all the way back to a central phone office. That posed a problem for cable operators when they began offering Internet access: how do you tell which traffic on the wire is being paid for by customers, and how do you limit them to their subscribed speed tier?
The basic mechanism involved MAC controls. Each cable modem had a unique MAC address linked to a subscriber's account, so the cable headend could simply block all traffic that didn't originate from a MAC address linked to a paid-up account. Problem solved!
But not completely, because computers are notoriously flexible. Intrepid hackers quickly figured out tricks to rewrite their MAC addresses, using ones associated with paying customers. Bam—free Internet.
Of course, there was a hitch. Cable companies, though widely loathed, are not in fact staffed only with zombified morons. They had a further limitation in place on local lines: two identical MAC addresses couldn't exist on a single neighborhood segment, to prevent exactly this sort of fraud.
So the hackers had to get social. Using tools like CoaxThief, they could sniff their local cable lines for the MAC addresses of other users, but they couldn't use the addresses themselves. Instead, they went online—to forums like those on TCNiSO.net—and they swapped with others who had done the same thing. Now the two hackers involved in the swap had a MAC address that came from outside their neighborhood. They just had to get it into the modem, which was designed to prevent such tampering.
That's where Harris's other software came in. Released in 2003, the Sigma firmware exploited modem vulnerabilities to install itself into a modem's memory, allowing users to change the device's MAC addresses. The code had to stay continuously up-to-date, since cable companies regularly tweaked their own countermeasures in response. In 2005, for instance, Sigma became SigmaX and gained the ability to defeat cable-company initiated 'probes' of cable modems on their lines.
Change Mac Address Cable Modem
Despite the nature of his business, Harris was concerned about the piracy of his software. A 2006 version of his site warned that 'all of the software found on this page is property of TCNiSO, INC' and said that it could not 'be distributed or linked to, without the written consent of TCNiSO.'
Modem Mac Address
With the right MAC address and the right software, suddenly the hacked cable modem provided a connection to the cable system. And it could get even faster. Cable modems use cable-provided profiles to limit users to specific speed tiers; Harris also found ways to uncap the modems by altering these profiles, upping their speeds dramatically.
Despite the talk about 'diagnostic purposes,' the TCNiSO.net operation doesn't come across as a particularly subtle operation. Harris employed several people around the country to code his apps and firmware, and he oversaw a forum in which people offered troubleshooting advice on stealing Internet service and on exchanging MAC addresses. (One thread in 2006 was called 'What i need to do, so my isp can't catch me.' Others offered 'the Charter 0/0 config for download,' while another asked: 'RR [RoadRuner] in North Carolina, anyone want to trade macs?') An FBI agent had no trouble calling the phone number for TCNiSO and ordering a hacked modem.