Difference between revisions of "MAC address spoofing"

From ArchWiki
Jump to: navigation, search
(Using the Template:Bc instead of space)
m (Capital letters, newline)
(15 intermediate revisions by 4 users not shown)
Line 6: Line 6:
 
[[ru:MAC Address Spoofing]]
 
[[ru:MAC Address Spoofing]]
 
[[zh-CN:MAC Address Spoofing]]
 
[[zh-CN:MAC Address Spoofing]]
There are two methods for spoofing a Media Access Control (MAC) address on Arch. Both of them are outlined below.
+
This article gives several methods to spoof a Media Access Control (MAC) address.
 +
{{Note|In the examples below is assumed the ethernet device is {{ic|enp1s0}}. Use {{ic|ip link}} to check your actual device name, and adjust the examples as necessary}}
  
== Method 1: macchanger ==
+
== Manually ==
  
The first method uses {{Pkg|macchanger}} (a.k.a., the GNU MAC Changer). It provides a variety of features such as changing the address to match a certain vendor or completely randomizing it.  
+
There are two methods for spoofing a MAC address using either {{Pkg|iproute2}} (installed by default) or {{Pkg|macchanger}} (available on the [[official repositories]]).  
  
[[Pacman|Install]] the package {{Pkg|macchanger}} from the [[Official Repositories]].
+
Both of them are outlined below.
  
After this, the MAC can be spoofed with a random address. The syntax is {{ic|macchanger -r ''<device>''}}. Standard names for devices are eth0 (for Ethernet) and wlan0 (for wireless), if only one device of each type is connected. For a secondary device, it would be eth1 or wlan1.
+
=== Method 1: iproute2 ===
  
Here is an example command for spoofing the MAC address of a device named eth0.
+
First, you can check your current MAC address with the command:
  
{{bc|# macchanger -r eth0}}
+
# ip link show enp1s0
  
To randomize all of the address except for the vendor bytes (that is, so that if the MAC address was checked it would still register as being from the same vendor), you would run the command:
+
The section that interests us at the moment is the one that has "link/ether" followed by a 6-byte number. It will probably look something like this:
  
{{bc|# macchanger -e eth0}}
+
link/ether 00:1d:98:5a:d1:3a
  
Finally, to change the MAC address to a specific value, you would run:
+
The first step to spoofing the MAC address is to bring the network interface down. You must be logged in as root to do this. It can be accomplished with the command:
  
{{bc|# macchanger --mac=XX:XX:XX:XX:XX:XX}}
+
# ip link set dev enp1s0 down
  
Where {{ic|XX:XX:XX:XX:XX:XX}} is the MAC you wish to change to.
+
Next, we actually spoof our MAC. Any hexadecimal value will do, but some networks may be configured to refuse to assign IP addresses to a client whose MAC does not match up with a vendor. Therefore, unless you control the network(s) you are connecting to, it is a good idea to test this out with a known good MAC rather than randomizing it right away.
  
{{Note|A device cannot be in use (connected in any way or with its interface up) while the MAC address is being changed.}}
+
To change the MAC, we need to run the command:
  
== Method 2: Manual ==
+
# ip link set dev enp1s0 address XX:XX:XX:XX:XX:XX
  
This method also assumes that your device name is eth0. For clarification, read the second paragraph of Method 1.
+
Where any 6-byte value will suffice for 'XX:XX:XX:XX:XX:XX'.
  
First, you can check your current MAC address with the command:
+
The final step is to bring the network interface back up. This can be accomplished by running the command:
  
{{bc|# ip link show eth0}}
+
# ip link set dev enp1s0 up
  
The section that interests us at the moment is the one that has "link/ether" followed by a 6-byte number. It will probably look something like this:
+
If you want to verify that your MAC has been spoofed, simply run {{ic|ip link show enp1s0}} again and check the value for 'link/ether'. If it worked, 'link/ether' should be whatever address you decided to change it to.
  
{{bc|link/ether 00:1d:98:5a:d1:3a}}
+
=== Method 2: macchanger ===
  
The first step to spoofing the MAC address is to bring the network interface down. You must be logged in as root to do this. It can be accomplished with the command:
+
Another method uses {{Pkg|macchanger}} (a.k.a., the GNU MAC Changer). It provides a variety of features such as changing the address to match a certain vendor or completely randomizing it.  
  
{{bc|# ip link set dev eth0 down}}
+
[[Pacman|Install]] the package {{Pkg|macchanger}} from the [[official repositories]].
  
Next, we actually spoof our MAC. Any hexadecimal value will do, but some networks may be configured to refuse to assign IP addresses to a client whose MAC does not match up with a vendor. Therefore, unless you control the network(s) you are connecting to, it is a good idea to test this out with a known good MAC rather than randomizing it right away.
+
After this, the MAC can be spoofed with a random address. The syntax is {{ic|macchanger -r ''<device>''}}.  
  
To change the MAC, we need to run the command:
+
Here is an example command for spoofing the MAC address of a device named enp1s0.
  
{{bc|# ip link set dev eth0 address XX:XX:XX:XX:XX:XX}}
+
# macchanger -r enp1s0
  
Where any 6-byte value will suffice for 'XX:XX:XX:XX:XX:XX'.
+
To randomize all of the address except for the vendor bytes (that is, so that if the MAC address was checked it would still register as being from the same vendor), you would run the command:
  
The final step is to bring the network interface back up. This can be accomplished by running the command:
+
# macchanger -e enp1s0
  
{{bc|# ip link set dev eth0 up}}
+
To change the MAC address to a specific value, you would run:
  
If you want to verify that your MAC has been spoofed, simply run {{ic|ip link show eth0}} again and check the value for 'link/ether'. If it worked, 'link/ether' should be whatever address you decided to change it to.
+
# macchanger --mac=XX:XX:XX:XX:XX:XX enp1s0
  
== Spoofing the MAC address ==
+
Where {{ic|XX:XX:XX:XX:XX:XX}} is the MAC you wish to change to.
  
=== With netcfg ===
+
Finally, to return the MAC address to its original, permanent hardware value:
  
Put the following line in your [[netcfg]] profile to have it spoof your MAC address when it's started:
+
# macchanger -p enp1s0
  
{{bc|PRE_UP='macchanger -e wlan0'}}
+
{{Note|A device cannot be in use (connected in any way or with its interface up) while the MAC address is being changed.}}
  
You may have to replace {{ic|wlan0}} with your interface name.
+
== Automatically ==
  
=== On Boot ===
+
{{Out of date|[[netcfg]] is deprecated, use [[netctl]] instead}}
  
You will notice with the above methods that upon reboot, your MAC will return to its initial default value. To set your MAC on boot, create the the following:
+
=== Netcfg ===
  
{{hc|/etc/rc.d/functions.d/macspoof|
+
[[Pacman|Install]] the package {{Pkg|macchanger}} from the [[official repositories]]. Read the [[#Method 2: macchanger]] method for more information.
spoof_mac() {
+
ip link set dev eth0 address XX:XX:XX:XX:XX:XX
+
}
+
  
add_hook sysinit_end spoof_mac}}
+
Put the following line in your [[netcfg]] profile to have it spoof your MAC address when it's started:
  
=== Systemd Unit ===
+
PRE_UP='macchanger -e enp1s0'
  
Same thing with systemd:
+
You may have to replace {{ic|enp1s0}} with your interface name.
  
{{hc|/etc/systemd/system/macspoof@.service|
+
=== Systemd unit ===
 +
 
 +
{{hc|/etc/systemd/system/macspoof@.service|<nowiki>
 
[Unit]
 
[Unit]
Description&#61;MAC address change %I
+
Description=MAC address change %I
Before&#61;dhcpcd@%i.service
+
Before=dhcpcd@%i.service
  
 
[Service]
 
[Service]
Type&#61;oneshot
+
Type=oneshot
ExecStart&#61;/usr/sbin/ip link set dev %i address 36:aa:88:c8:75:3a
+
ExecStart=/usr/bin/ip link set dev %i address 36:aa:88:c8:75:3a
ExecStart&#61;/usr/sbin/ip link set dev %i up
+
ExecStart=/usr/bin/ip link set dev %i up
  
 
[Install]
 
[Install]
WantedBy&#61;network.target}}
+
WantedBy=network.target
 +
</nowiki>}}
 +
 
 
You may have to edit this file if you do not use dhcpcd.
 
You may have to edit this file if you do not use dhcpcd.
Note: This works without netcfg. If you are using netcfg, see above.
+
 
 +
{{Note|This works without netcfg. If you are using netcfg, see above.}}
 +
 
 +
=== Systemd unit using random address ===
 +
 
 +
A unit featuring random address, which requires macchanger:
 +
 
 +
{{hc|/etc/systemd/system/macchanger@.service|<nowiki>
 +
[Unit]
 +
Description=Macchanger service for %I
 +
Documentation=man:macchanger(1)
 +
 
 +
[Service]
 +
ExecStart=/usr/bin/macchanger -e %I
 +
Type=oneshot
 +
 
 +
[Install]
 +
WantedBy=multi-user.target
 +
</nowiki>}}
  
 
== See also ==
 
== See also ==
  
* [http://www.alobbs.com/macchanger macchanger project page]   
+
* [http://www.alobbs.com/macchanger Macchanger project page]   
* [http://www.debianadmin.com/change-your-network-card-mac-media-access-control-address.html Article on DebianAdmin] with more macchanger options.
+
* [http://www.debianadmin.com/change-your-network-card-mac-media-access-control-address.html Article on DebianAdmin] with more macchanger options
* [http://wiki.gotux.net/downloads/smac SMAC] Arch Linux MAC Address Spoofer
+

Revision as of 08:31, 6 July 2013

This article gives several methods to spoof a Media Access Control (MAC) address.

Note: In the examples below is assumed the ethernet device is enp1s0. Use ip link to check your actual device name, and adjust the examples as necessary

Manually

There are two methods for spoofing a MAC address using either iproute2 (installed by default) or macchanger (available on the official repositories).

Both of them are outlined below.

Method 1: iproute2

First, you can check your current MAC address with the command:

# ip link show enp1s0

The section that interests us at the moment is the one that has "link/ether" followed by a 6-byte number. It will probably look something like this:

link/ether 00:1d:98:5a:d1:3a

The first step to spoofing the MAC address is to bring the network interface down. You must be logged in as root to do this. It can be accomplished with the command:

# ip link set dev enp1s0 down

Next, we actually spoof our MAC. Any hexadecimal value will do, but some networks may be configured to refuse to assign IP addresses to a client whose MAC does not match up with a vendor. Therefore, unless you control the network(s) you are connecting to, it is a good idea to test this out with a known good MAC rather than randomizing it right away.

To change the MAC, we need to run the command:

# ip link set dev enp1s0 address XX:XX:XX:XX:XX:XX

Where any 6-byte value will suffice for 'XX:XX:XX:XX:XX:XX'.

The final step is to bring the network interface back up. This can be accomplished by running the command:

# ip link set dev enp1s0 up

If you want to verify that your MAC has been spoofed, simply run ip link show enp1s0 again and check the value for 'link/ether'. If it worked, 'link/ether' should be whatever address you decided to change it to.

Method 2: macchanger

Another method uses macchanger (a.k.a., the GNU MAC Changer). It provides a variety of features such as changing the address to match a certain vendor or completely randomizing it.

Install the package macchanger from the official repositories.

After this, the MAC can be spoofed with a random address. The syntax is macchanger -r <device>.

Here is an example command for spoofing the MAC address of a device named enp1s0.

# macchanger -r enp1s0

To randomize all of the address except for the vendor bytes (that is, so that if the MAC address was checked it would still register as being from the same vendor), you would run the command:

# macchanger -e enp1s0

To change the MAC address to a specific value, you would run:

# macchanger --mac=XX:XX:XX:XX:XX:XX enp1s0

Where XX:XX:XX:XX:XX:XX is the MAC you wish to change to.

Finally, to return the MAC address to its original, permanent hardware value:

# macchanger -p enp1s0
Note: A device cannot be in use (connected in any way or with its interface up) while the MAC address is being changed.

Automatically

Tango-view-refresh-red.pngThis article or section is out of date.Tango-view-refresh-red.png

Reason: netcfg is deprecated, use netctl instead (Discuss in Talk:MAC address spoofing#)

Netcfg

Install the package macchanger from the official repositories. Read the #Method 2: macchanger method for more information.

Put the following line in your netcfg profile to have it spoof your MAC address when it's started:

PRE_UP='macchanger -e enp1s0'

You may have to replace enp1s0 with your interface name.

Systemd unit

/etc/systemd/system/macspoof@.service
[Unit]
Description=MAC address change %I
Before=dhcpcd@%i.service

[Service]
Type=oneshot
ExecStart=/usr/bin/ip link set dev %i address 36:aa:88:c8:75:3a
ExecStart=/usr/bin/ip link set dev %i up

[Install]
WantedBy=network.target

You may have to edit this file if you do not use dhcpcd.

Note: This works without netcfg. If you are using netcfg, see above.

Systemd unit using random address

A unit featuring random address, which requires macchanger:

/etc/systemd/system/macchanger@.service
[Unit]
Description=Macchanger service for %I
Documentation=man:macchanger(1)

[Service]
ExecStart=/usr/bin/macchanger -e %I
Type=oneshot

[Install]
WantedBy=multi-user.target

See also