Difference between revisions of "MAC address spoofing"
(Unnecessary clarification) |
(update link(s) (avoid redirect)) |
||
(23 intermediate revisions by 7 users not shown) | |||
Line 6: | Line 6: | ||
[[ru:MAC Address Spoofing]] | [[ru:MAC Address Spoofing]] | ||
[[zh-CN:MAC Address Spoofing]] | [[zh-CN:MAC Address Spoofing]] | ||
− | + | This article gives several methods to spoof a Media Access Control (MAC) address. | |
+ | {{Note|In the examples below is assumed the ethernet device is {{ic|enp1s0}}. Use {{ic|ip link}} to check your actual device name, and adjust the examples as necessary}} | ||
− | == | + | == Manually == |
− | + | There are two methods for spoofing a MAC address using either {{Pkg|iproute2}} (installed by default) or {{Pkg|macchanger}} (available on the [[official repositories]]). | |
− | + | Both of them are outlined below. | |
− | + | === Method 1: iproute2 === | |
− | + | First, you can check your current MAC address with the command | |
− | + | # ip link show ''interface'' | |
− | + | where {{ic|''interface''}} is the name of your [[Network configuration#Network_Interfaces|network interface]]. | |
+ | |||
+ | The section that interests us at the moment is the one that has "link/ether" followed by a 6-byte number. It will probably look something like this: | ||
+ | |||
+ | link/ether 00:1d:98:5a:d1:3a | ||
+ | |||
+ | The first step to spoofing the MAC address is to bring the network interface down. It can be accomplished with the command: | ||
+ | |||
+ | # ip link set dev ''interface'' down | ||
− | + | Next, we actually spoof our MAC. Any hexadecimal value will do, but some networks may be configured to refuse to assign IP addresses to a client whose MAC does not match up with a vendor. Therefore, unless you control the network(s) you are connecting to, it is a good idea to test this out with a known good MAC rather than randomizing it right away. | |
− | + | To change the MAC, we need to run the command: | |
− | + | # ip link set dev ''interface'' address XX:XX:XX:XX:XX:XX | |
− | Where | + | Where any 6-byte value will suffice for 'XX:XX:XX:XX:XX:XX'. |
− | + | The final step is to bring the network interface back up. This can be accomplished by running the command: | |
− | + | # ip link set dev ''interface'' up | |
− | + | If you want to verify that your MAC has been spoofed, simply run {{ic|ip link show ''interface''}} again and check the value for 'link/ether'. If it worked, 'link/ether' should be whatever address you decided to change it to. | |
− | + | === Method 2: macchanger === | |
− | + | Another method uses {{Pkg|macchanger}} (a.k.a., the GNU MAC Changer). It provides a variety of features such as changing the address to match a certain vendor or completely randomizing it. | |
− | {{ | + | [[Pacman|Install]] the package {{Pkg|macchanger}} from the [[official repositories]]. |
− | The | + | The spoofing is done on per-interface basis, specify [[Network configuration#Network_Interfaces|network interface]] name as {{ic|''interface''}} in each of the following commands. |
− | + | The MAC address can be spoofed with a fully random address: | |
− | + | # macchanger -r ''interface'' | |
− | To | + | To randomize all of the address except for the vendor bytes (that is, so that if the MAC address was checked it would still register as being from the same vendor), you would run the command: |
− | + | # macchanger -e ''interface'' | |
− | + | To change the MAC address to a specific value, you would run: | |
− | + | # macchanger --mac=XX:XX:XX:XX:XX:XX ''interface'' | |
− | {{ | + | Where {{ic|XX:XX:XX:XX:XX:XX}} is the MAC you wish to change to. |
− | + | Finally, to return the MAC address to its original, permanent hardware value: | |
− | + | # macchanger -p ''interface'' | |
− | + | {{Note|A device cannot be in use (connected in any way or with its interface up) while the MAC address is being changed.}} | |
− | + | == Automatically == | |
− | + | === Systemd unit === | |
− | + | This example uses [[#Method 1: iproute2]]. | |
− | == | + | {{hc|/etc/systemd/system/macspoof@.service|<nowiki> |
+ | [Unit] | ||
+ | Description=MAC address change %I | ||
+ | Before=dhcpcd@%i.service | ||
− | + | [Service] | |
+ | Type=oneshot | ||
+ | ExecStart=/usr/bin/ip link set dev %i address 36:aa:88:c8:75:3a | ||
+ | ExecStart=/usr/bin/ip link set dev %i up | ||
− | + | [Install] | |
− | + | WantedBy=network.target | |
− | + | </nowiki>}} | |
− | } | ||
− | + | You may have to edit this file if you do not use [[dhcpcd]]. | |
− | === Systemd | + | === Systemd unit using random address === |
− | + | This example uses [[#Method 2: macchanger]], so make sure that {{Pkg|macchanger}} is [[Pacman|installed]]. | |
− | {{hc|/etc/systemd/system/ | + | {{hc|/etc/systemd/system/macchanger@.service|<nowiki> |
[Unit] | [Unit] | ||
− | Description | + | Description=Macchanger service for %I |
− | + | Documentation=man:macchanger(1) | |
[Service] | [Service] | ||
− | + | ExecStart=/usr/bin/macchanger -e %I | |
− | ExecStart | + | Type=oneshot |
− | |||
[Install] | [Install] | ||
− | WantedBy | + | WantedBy=multi-user.target |
− | + | </nowiki>}} | |
− | |||
== See also == | == See also == | ||
− | * [ | + | * [https://github.com/alobbs/macchanger Macchanger GitHub page] |
− | * [http://www.debianadmin.com/change-your-network-card-mac-media-access-control-address.html Article on DebianAdmin] with more macchanger options | + | * [http://www.debianadmin.com/change-your-network-card-mac-media-access-control-address.html Article on DebianAdmin] with more macchanger options |
− |
Revision as of 12:22, 15 February 2014
zh-CN:MAC Address Spoofing This article gives several methods to spoof a Media Access Control (MAC) address.
enp1s0
. Use ip link
to check your actual device name, and adjust the examples as necessaryContents
Manually
There are two methods for spoofing a MAC address using either iproute2 (installed by default) or macchanger (available on the official repositories).
Both of them are outlined below.
Method 1: iproute2
First, you can check your current MAC address with the command
# ip link show interface
where interface
is the name of your network interface.
The section that interests us at the moment is the one that has "link/ether" followed by a 6-byte number. It will probably look something like this:
link/ether 00:1d:98:5a:d1:3a
The first step to spoofing the MAC address is to bring the network interface down. It can be accomplished with the command:
# ip link set dev interface down
Next, we actually spoof our MAC. Any hexadecimal value will do, but some networks may be configured to refuse to assign IP addresses to a client whose MAC does not match up with a vendor. Therefore, unless you control the network(s) you are connecting to, it is a good idea to test this out with a known good MAC rather than randomizing it right away.
To change the MAC, we need to run the command:
# ip link set dev interface address XX:XX:XX:XX:XX:XX
Where any 6-byte value will suffice for 'XX:XX:XX:XX:XX:XX'.
The final step is to bring the network interface back up. This can be accomplished by running the command:
# ip link set dev interface up
If you want to verify that your MAC has been spoofed, simply run ip link show interface
again and check the value for 'link/ether'. If it worked, 'link/ether' should be whatever address you decided to change it to.
Method 2: macchanger
Another method uses macchanger (a.k.a., the GNU MAC Changer). It provides a variety of features such as changing the address to match a certain vendor or completely randomizing it.
Install the package macchanger from the official repositories.
The spoofing is done on per-interface basis, specify network interface name as interface
in each of the following commands.
The MAC address can be spoofed with a fully random address:
# macchanger -r interface
To randomize all of the address except for the vendor bytes (that is, so that if the MAC address was checked it would still register as being from the same vendor), you would run the command:
# macchanger -e interface
To change the MAC address to a specific value, you would run:
# macchanger --mac=XX:XX:XX:XX:XX:XX interface
Where XX:XX:XX:XX:XX:XX
is the MAC you wish to change to.
Finally, to return the MAC address to its original, permanent hardware value:
# macchanger -p interface
Automatically
Systemd unit
This example uses #Method 1: iproute2.
/etc/systemd/system/macspoof@.service
[Unit] Description=MAC address change %I Before=dhcpcd@%i.service [Service] Type=oneshot ExecStart=/usr/bin/ip link set dev %i address 36:aa:88:c8:75:3a ExecStart=/usr/bin/ip link set dev %i up [Install] WantedBy=network.target
You may have to edit this file if you do not use dhcpcd.
Systemd unit using random address
This example uses #Method 2: macchanger, so make sure that macchanger is installed.
/etc/systemd/system/macchanger@.service
[Unit] Description=Macchanger service for %I Documentation=man:macchanger(1) [Service] ExecStart=/usr/bin/macchanger -e %I Type=oneshot [Install] WantedBy=multi-user.target
See also
- Macchanger GitHub page
- Article on DebianAdmin with more macchanger options