Quote:
	
	
		| 
					Originally Posted by deadite66  on linux
 ifdown eth0
 macchanger -r eth0
 ifup eth0
 | 
	
 Technically this would be the final step as the above simply sets your mac to a random mac which still won't give access to another system if mac filtering is in place.
You would first have to break the encryption between a client system and the router in order to read the traffic and find out what a legitimate mac is.  Then you could spoof (using a method similar to above, p.s. to do the above in windows is a reg key and reboot) the mac address of that client machine.  
Though you still have problems here as you will have extemely sporadic network traffic at best as the router would have two different clients with the same mac.  It goes on quite a bit more than this but this is enough for the time being.
Hence my comment there are many levels to crack a system.  It is not always easy but it happens on rare occasions.  As an example a director in my company set up his own web/ftp server (IT had no contact with it) and it was running for 6 + years before it was hacked.  Nothing fancy, a simple error he left the Administrator account enabled with a blank password by mistake.
Yes mac filtering is crude and on its own is not recommended but it can be quite an effective deterrent.
---------- Post added at 23:41 ---------- Previous post was at 23:37 ----------
	Quote:
	
	
		| 
					Originally Posted by xpod  . | 
	
 That'll teach me for long posts 
