MAC ( Media Access Control ) ID is unique 48 bits identification for any network interfaces. for eg. NIC (Network Interface Card, popularly known as LAN card or Ethernet card), Wi-fi card,Router, Wireless Access Points(APs) , Switches and so on.
MAC spoofing is a kind of attack in which attacker replaces MAC of his machine with another MAC which belongs to some other user.
This attack is particularly useful where in any organization ( usually universities) where user's MAC is registered in order to surf the internet.In that case whenever a user request a internet connection to his ISP, it is first checked that whether the request which is coming has a valid/Registered MAC or not.If it is registered,the user is permit to access the internet.
Now,if a attacker somehow know what are the valid MACs for this network,he could spoof it and will be able to connect to the network.
how MAC spoofing is done on Windows and Linux ??? It will be discuss in the next post.
Sunday, July 20, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment