Hacking For Dummies by Kevin Beaver

Hacking For Dummies by Kevin Beaver

Author:Kevin Beaver
Language: eng
Format: epub, pdf
ISBN: 9781119485513
Publisher: Wiley
Published: 2018-07-11T00:00:00+00:00


MAC spoofing

A common defense for wireless networks is MAC address controls. These controls involve configuring your APs to allow only wireless clients with known MAC addresses to connect to the network. Consequently, a common hack against wireless networks is MAC address spoofing.

The bad guys can easily spoof MAC addresses in Linux by using the ifconfig command and in Windows by using the SMAC utility, as I describe in Chapter 9. Like WEP and WPA, however, MAC address-based access controls are another layer of protection and better than nothing at all. If someone spoofs one of your MAC addresses, the only way to detect malicious behavior is through contextual awareness by spotting the same MAC address being used in two or more places on the WLAN, which can be tricky.

One simple way to determine whether an AP is using MAC address controls is to try to associate with it and obtain an IP address via DHCP. If you can get an IP address, the AP doesn’t have MAC address controls enabled.

The following steps outline how you can test your MAC address controls and demonstrate just how easy they are to circumvent:

Find an AP to attach to.

You can simply load NetStumbler, as shown in Figure 10-16.

In this test network, the AP with the SSID of doh! is the one I want to test. Note the MAC address of this AP as well. This address helps you make sure you’re looking at the right packets in the steps that follow. Although I’ve hidden most of the MAC address of this AP for the sake of privacy, suppose that its MAC address is 00:40:96:FF:FF:FF. Also notice in Figure 10-16 that NetStumbler was able to determine the IP address of the AP. Getting an IP address helps you confirm that you’re on the right wireless network.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12582)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7785)
Grails in Action by Glen Smith Peter Ledbrook(7699)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6420)
Kotlin in Action by Dmitry Jemerov(5068)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3816)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3088)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2870)
The Art Of Deception by Kevin Mitnick(2609)
Drugs Unlimited by Mike Power(2469)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2316)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2315)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2263)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2202)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2084)
Wireless Hacking 101 by Karina Astudillo(2079)
Full-Stack React Projects by Shama Hoque(1991)