User Controls
Anonymous downloading??
-
2021-12-09 at 9:40 PM UTCDeleted ROM data can be recovered just the same as deleted hard drive data. It's not all that hard.
-
2021-12-09 at 10:29 PM UTC
Originally posted by Donald Trump How on earth do you retrieve that sort of info? And does it survive a reboot? I doubt it.
Modern devices use random MACs anyway.
https://www.mist.com/get-to-know-mac-address-randomization-in-2020/
there must be a log somewhere.
have you ever look at the url bar of the log in page to the free wifi services such as airports, hotels and cafes ?
i mean those that redirect to their own internal login page where your username and password are required. the url usually contains your own mac id and routers mac id.
whether these information is logged or not i have no idea but the capability is there. -
2021-12-09 at 10:30 PM UTC
Originally posted by Jiggaboo_Johnson
I'm not going to name the devices we build as it would obviously be divulging PI.
But, as the manufacturer we have a "backdoor" where we "program"/enter/change/ the MAC address via an RS232 connection and a "hidden" back door. The devices have NO hardware/software/anywhere MAC address on them till WE put them on there…anyone who had access to the backdoor could change that. The circuit board is our own design or own designed hardware and firmware.
Our devices are also used in Gov/military installations just as an FYI.
If you had one of our devices and I told you how to access it..you could change the ONLY MAC address on it to whatever you liked. We are not the only company in the world who programs MAC addresses this way.
Part of the reasoning for that ability to dynamically change the address was several of our customers request we use THEIR MAC addresses so in that instance we have to "reprogram" them using their MAC address vs ours….(you buy MAC addresses in like batches of 2k or something as I recall…last time I bought them we got a decades worth so that figure may have changed).
ETA: the first few hex blocks are the identifier of the MAC address owner (who bought that string of MAC addresses)…You'd basically just need to change those to whatever…. 00 20 E1 to 00 C3 F5…done..MAC address faked and untraceable.
but we are not talking about using the devices you manufacture in starbucks. -
2021-12-10 at 1:17 PM UTC
-
2021-12-10 at 1:24 PM UTCWith the level of hacking seen today, security is virtually non-existent. All roads lead to your doorstep. If you want to try anything these days, you better be damned good.
-
2021-12-10 at 2:11 PM UTC
-
2021-12-10 at 5:31 PM UTC
-
2021-12-10 at 5:36 PM UTC"MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address, or as an Ethernet hardware address, hardware address, or physical address. Each address can be stored in hardware, such as the card's read-only memory, or by a firmware mechanism".
If you know, you know...clearly you "hackers" don't. -
2021-12-10 at 6:08 PM UTC
Originally posted by Jiggaboo_Johnson "MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address, or as an Ethernet hardware address, hardware address, or physical address. Each address can be stored in hardware, such as the card's read-only memory, or by a firmware mechanism".
If you know, you know…clearly you "hackers" don't.
I knew all along. -
2021-12-10 at 6:18 PM UTC
-
2021-12-10 at 8:36 PM UTCjust buy a cheap laptop on craigslist with money, install linux. (if you're really spooky put qubesOS with TailsOS in a VM), go to starbucks. buy a drink, get the wifi password. come back the next day with your linux laptop and stay in your car. use the tool macchanger, download and enjoy.
-
2021-12-10 at 8:40 PM UTCThe author of this post has returned to nothingness
-
2021-12-15 at 4:19 AM UTC
Originally posted by Jiggaboo_Johnson "MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address, or as an Ethernet hardware address, hardware address, or physical address. Each address can be stored in hardware, such as the card's read-only memory, or by a firmware mechanism".
If you know, you know…clearly you "hackers" don't.
Spectral isn't a hacker.
Some peripherals only allow you to do it at the firmware level, think USB WiFi. Some might be confused due to the fact you need a 'real' device MAC if you're going to be spoofing at the hardware level, for instance:
0024 - 00:00:18 - WEBSTER COMPUTER CORPORATION
0025 - 00:00:19 - APPLIED DYNAMICS INTERNATIONAL
0026 - 00:00:1a - ADVANCED MICRO DEVICES
0027 - 00:00:1b - NOVELL INC.
0028 - 00:00:1c - BELL TECHNOLOGIES
0029 - 00:00:1d - CABLETRON SYSTEMS, INC.
You can make up a MAC out of thin air but applying such a MAC may give away the fact you're spoofing. Linux tooling that works with MAc spoofing allows you to set random MACs but also provides an option that sets a valid MAC as a burned in address.
#!/bin/bash
# List of interfaces
IFACES=$(ip link | awk -F: '$0 !~ "lo|vir|wl|^[^0-9]"{print $2;getline}')
read -p "Change MAC?[Y/n]: " choice
if [[ $choice == 'Y' || $choice == 'y' ]]; then
read -p "New MAC?: " value
if [[ $value != '' ]]; then
for x in $IFACES; do sudo macchanger --mac=$value --bia $x; done
else
echo -e "\nInvalid Input\n" && exit 1
fi
fi
echo -e "\nDone\n" && exit 0
The --bia arg tells it to spoof hardware MAC or make it a 'burned in address'.