With Kali Linux, MAC spoofing is dead simple.
Just enter the terminal. Then, power down your Wireless LAN, so you can change its MAC address. Change its MAC. Then, power it back up with the new “spoofed” MAC. Here’s what the commands look like:
iwconfig
(Lists your wireless cards to get your wifi card name. We’ll assume wlan0 here.)
ifconfig wlan0 down
(Powers down the wireless card.)
macchanger --random wlan0
(Changes wlan0 MAC to random MAC address.)
ifconfig wlan0 up
(Powers the wireless card back up with new MAC.)
That’s it.
Now, of course, to still be able capture packets on your network (since you just changed your card’s MAC and it won’t get sent any packets) you need to change your wireless card’s mode from “Managed” to “Monitor” so it sucks up any nearby packets.
But, I think you get the idea.
Stupid simple to spoof a MAC.
I can only imagine how some of you will use this to jack with your friends. 🙂
But, more importantly, this is one of the many things that lay people think is impossible that a hacker can do in all of about 2 minutes. And, use to hack your computer, website, whatever and not get caught.
That’s the threat.
And, it’s very real.
And, it’s why when I was in the Army I spent most of my time learning how to hack… so I had an idea of what I was up against and could develop ways to prevent it. That and make all my buddies think I was a badass. 😀
Anyway, there’s a simple way to learn all this stuff… right here. Even better, I got you a significant discount on the course. No reason not to learn all this.
Go here: https://johnmorrisonline.com/go?id=ethicalhacking
(Yes, that’s an affiliate link… so you’ll not only get the discount but also be helping me to produce more content for you when you use it.)
Learn it.
Jack with your friends.
Then, make your website, apps, network or whatever a “hard target”.
P.S. Hopefully, it goes without saying that you shouldn’t ever use this stuff to do anything illegal. That’s be dumb and not what I’m suggesting. The point is to learn how hackers work and think so you can developer strategies to defeat them.
Photo by: Christiaan Colen