User Controls

Anonymous downloading??

  1. #21
    Deleted ROM data can be recovered just the same as deleted hard drive data. It's not all that hard.
  2. #22
    Originally posted by Donald Trump How on earth do you retrieve that sort of info? And does it survive a reboot? I doubt it.

    Modern devices use random MACs anyway.

    https://www.mist.com/get-to-know-mac-address-randomization-in-2020/

    there must be a log somewhere.

    have you ever look at the url bar of the log in page to the free wifi services such as airports, hotels and cafes ?

    i mean those that redirect to their own internal login page where your username and password are required. the url usually contains your own mac id and routers mac id.

    whether these information is logged or not i have no idea but the capability is there.
  3. #23
    Originally posted by Jiggaboo_Johnson





    I'm not going to name the devices we build as it would obviously be divulging PI.

    But, as the manufacturer we have a "backdoor" where we "program"/enter/change/ the MAC address via an RS232 connection and a "hidden" back door. The devices have NO hardware/software/anywhere MAC address on them till WE put them on there…anyone who had access to the backdoor could change that. The circuit board is our own design or own designed hardware and firmware.

    Our devices are also used in Gov/military installations just as an FYI.

    If you had one of our devices and I told you how to access it..you could change the ONLY MAC address on it to whatever you liked. We are not the only company in the world who programs MAC addresses this way.

    Part of the reasoning for that ability to dynamically change the address was several of our customers request we use THEIR MAC addresses so in that instance we have to "reprogram" them using their MAC address vs ours….(you buy MAC addresses in like batches of 2k or something as I recall…last time I bought them we got a decades worth so that figure may have changed).

    ETA: the first few hex blocks are the identifier of the MAC address owner (who bought that string of MAC addresses)…You'd basically just need to change those to whatever…. 00 20 E1 to 00 C3 F5…done..MAC address faked and untraceable.

    but we are not talking about using the devices you manufacture in starbucks.
  4. #24
    Originally posted by vindicktive vinny but we are not talking about using the devices you manufacture in starbucks.

    Nor am I ..lern 2 raed
  5. #25
    With the level of hacking seen today, security is virtually non-existent. All roads lead to your doorstep. If you want to try anything these days, you better be damned good.
  6. #26
    Originally posted by Jiggaboo_Johnson Nor am I ..lern 2 raed

    then show me your back door.

    to re-program cellphone mac addresses.
  7. #27
    Originally posted by vindicktive vinny then show me your back door.

    Fucking faggot.
  8. #28
    "MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address, or as an Ethernet hardware address, hardware address, or physical address. Each address can be stored in hardware, such as the card's read-only memory, or by a firmware mechanism".

    If you know, you know...clearly you "hackers" don't.
  9. #29
    Originally posted by Jiggaboo_Johnson "MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address, or as an Ethernet hardware address, hardware address, or physical address. Each address can be stored in hardware, such as the card's read-only memory, or by a firmware mechanism".

    If you know, you know…clearly you "hackers" don't.

    I knew all along.
  10. #30
    Originally posted by ⠀⠀⠀⠀⠀⠀ I knew all along.

    The voices in your head told you.
  11. #31
    maddie Tuskegee Airman
    just buy a cheap laptop on craigslist with money, install linux. (if you're really spooky put qubesOS with TailsOS in a VM), go to starbucks. buy a drink, get the wifi password. come back the next day with your linux laptop and stay in your car. use the tool macchanger, download and enjoy.
    The following users say it would be alright if the author of this post didn't die in a fire!
  12. #32
    lockedin Tuskegee Airman
    The author of this post has returned to nothingness
  13. #33
    Sophie Pedophile Tech Support
    Originally posted by Jiggaboo_Johnson "MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address, or as an Ethernet hardware address, hardware address, or physical address. Each address can be stored in hardware, such as the card's read-only memory, or by a firmware mechanism".

    If you know, you know…clearly you "hackers" don't.

    Spectral isn't a hacker.

    Some peripherals only allow you to do it at the firmware level, think USB WiFi. Some might be confused due to the fact you need a 'real' device MAC if you're going to be spoofing at the hardware level, for instance:


    0024 - 00:00:18 - WEBSTER COMPUTER CORPORATION
    0025 - 00:00:19 - APPLIED DYNAMICS INTERNATIONAL
    0026 - 00:00:1a - ADVANCED MICRO DEVICES
    0027 - 00:00:1b - NOVELL INC.
    0028 - 00:00:1c - BELL TECHNOLOGIES
    0029 - 00:00:1d - CABLETRON SYSTEMS, INC.


    You can make up a MAC out of thin air but applying such a MAC may give away the fact you're spoofing. Linux tooling that works with MAc spoofing allows you to set random MACs but also provides an option that sets a valid MAC as a burned in address.


    #!/bin/bash

    # List of interfaces
    IFACES=$(ip link | awk -F: '$0 !~ "lo|vir|wl|^[^0-9]"{print $2;getline}')

    read -p "Change MAC?[Y/n]: " choice
    if [[ $choice == 'Y' || $choice == 'y' ]]; then

    read -p "New MAC?: " value
    if [[ $value != '' ]]; then
    for x in $IFACES; do sudo macchanger --mac=$value --bia $x; done
    else
    echo -e "\nInvalid Input\n" && exit 1
    fi

    fi

    echo -e "\nDone\n" && exit 0


    The --bia arg tells it to spoof hardware MAC or make it a 'burned in address'.
Jump to Top