Skip to main content

MAC Spoofing :-) MAC spoofing play an important role in WiFi hacking , network hacks and MITM ( Man in the middle attacks ).

  📌MAC spoofing in Kali :-)



Steps :- 

1. Disable the interference

2. Change the MAC 

3. Enable the interference 


Practicals:- 


Run the command "ifconfig


Check the interference you want to change the MAC, let's say it as the interference eth0


In the response returned by the ifconfig command look for the entry "ether". This will contain the corresponding MAC address


1. Disable the interference :- ifconfig eth0 down


2. Change the MAC :- ifconfig eth0 hw ether 00:11:22:33:44:55


3. Enable the interference :- ifconfig eth0 up


Now check by running the command ifconfig. The MAC address will be changed. 


Note :- Once we change the MAC address , it doesn't stay forever , once you re-start the system , the original MAC automatically replaces the spoofed one.

Comments

Popular posts from this blog

Pin-Bruteforce

 Hello all !! Now turn your Kali Nethunter into a bruteforce pin cracker . Here's all your methods ! Simply the method is:-) Git clone   https://github.com/urbanadventurer/Android-PIN-Bruteforce.git Ls Cd Pndroid-Pin-Bruteforce bash ./android-pin-bruteforce ./android-pin-bruteforce crack --length 3 ./android-pin-bruteforce crack --length 6 How it works It uses a USB OTG cable to connect the locked phone to the Nethunter device. It emulates a keyboard, automatically tries PINs, and waits after trying too many wrong guesses. [Nethunter phone] <–> [USB cable] <–> [USB OTG adaptor] <–> [Locked Android phone] The USB HID Gadget driver provides emulation of USB Human Interface Devices (HID). This enables an Android Nethunter device to emulate keyboard input to the locked phone. It’s just like plugging a keyboard into the locked phone and pressing keys. This takes just over 16.6 hours with a Samsung S5 to try all possible 4 digit PINs, but with the optimised PIN lis...

Acessing webcam(Phishing)

  Web-Cam Cam-phish is techniques to take cam shots of target’s phone or pc. It is a phishing tool which hosts fake websites on in built PHP server and uses ngrok server to generate a link which we will forward to the target, which can be used on over internet. Website asks for camera permission and if target allows it, this tool grab cam shots of target’s device. Requirements:- apt -get -y install php openssh git wget Installation :- git clone https://github.com/techchipnet/CamPhish cd CamPhish bash camphish.sh Cam-Phish is created to help in penetration testing and it's not responsible for any misuse or illegal purposes. Cam-Phish is inspired by  https://github.com/thelinuxchoice/  Big thanks !!!

Best WiFi Adapter for Kali Linux

1. Alfa AWUS036NH  We are using this WiFi adapter from the BackTrack days (before releasing Kali Linux) and still we consider it as one of the best. For it’s long range signals we can do our penetration testing jobs from a long distance. Alfa AWUS036NHA Kali Linux WiFi Adapter 2020 Alfa AWUS036NH is plug and play and compatible with any brand 802.11g or 802.11n router using 2.4 GHz wavelength and supports multi-stream & MIMO (multiple input multiple output) with high speed transfer TX data rate up to 150 MBPS. It also comes with a clip which can be used to attach this adapter on a laptop lid. Chipset: Atheros AR 9271. Compatible with any brand 802.11b, 802.11g or 802.11n router using 2.4 Ghz wave-length. Includes a 5 dBi omni directional antenna as well as a 7 dbi panel antenna. Supports security protocols: 64/128-bit WEP, WPA, WPA2, TKIP, AES. Compatible with Kali Linux RPi with monitor mode and packet injection. High transmitter power of 28 dBm – for long-rang and high gain W...