Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
The point is that there ARE tools to make initial testing easier. Some of them can do not nice things like look like other systems, but WE shall use them for the GOOD OF THE NET (tm). ;) On 09/19/2014 02:16 PM, Paul Lambert
wrote:
This tools supports both spoofing and local (random) MAC addresses. In developing guidelines for changing MAC addresses we should ensure that we use local MAC local addresses. Using local addresses may also enable better adaptation of existing Œlocation services¹ to spot and handle randomized addresses differently. Paul On 9/19/14, 7:48 AM, "Robert Moskowitz" <rgm@xxxxxxxxxxxxxxxxxxxx> wrote:Then there is this, readily available in Linux. On 09/17/2014 11:08 AM, Dario Lesca wrote:I use macchanger: $ sudo yum install macchanger ... $ macchanger --help GNU MAC Changer Usage: macchanger [options] device -h, --help Print this help -V, --version Print version and exit -s, --show Print the MAC address and exit -e, --ending Don't change the vendor bytes -a, --another Set random vendor MAC of the same kind -A Set random vendor MAC of any kind -p, --permanent Reset to original, permanent hardwareMAC -r, --random Set fully random MAC -l, --list[=keyword] Print known vendors -b, --bia Pretend to be a burned-in-address -m, --mac=XX:XX:XX:XX:XX:XX Set the MAC XX:XX:XX:XX:XX:XX --
Robert Moskowitz Senior Technical Advisor Security & Standards Verizon Business Systems C: F: E: There's no limit to what can be accomplished if it doesn't matter who gets the credit |