View Single Post
Old 04-03-2009, 00:41   #41
mischievious
Inactive
 
Join Date: Feb 2009
Location: Somewhere in the UK
Services: Sky
Posts: 255
mischievious is a glorious beacon of lightmischievious is a glorious beacon of lightmischievious is a glorious beacon of lightmischievious is a glorious beacon of lightmischievious is a glorious beacon of lightmischievious is a glorious beacon of lightmischievious is a glorious beacon of light
Re: WEP, WPA or MAC Filtering - Which is best

Quote:
Originally Posted by deadite66 View Post
on linux

ifdown eth0
macchanger -r eth0
ifup eth0
Technically this would be the final step as the above simply sets your mac to a random mac which still won't give access to another system if mac filtering is in place.

You would first have to break the encryption between a client system and the router in order to read the traffic and find out what a legitimate mac is. Then you could spoof (using a method similar to above, p.s. to do the above in windows is a reg key and reboot) the mac address of that client machine.

Though you still have problems here as you will have extemely sporadic network traffic at best as the router would have two different clients with the same mac. It goes on quite a bit more than this but this is enough for the time being.

Hence my comment there are many levels to crack a system. It is not always easy but it happens on rare occasions. As an example a director in my company set up his own web/ftp server (IT had no contact with it) and it was running for 6 + years before it was hacked. Nothing fancy, a simple error he left the Administrator account enabled with a blank password by mistake.

Yes mac filtering is crude and on its own is not recommended but it can be quite an effective deterrent.

---------- Post added at 23:41 ---------- Previous post was at 23:37 ----------

Quote:
Originally Posted by xpod View Post
.
That'll teach me for long posts
mischievious is offline   Reply With Quote