Will changing my MAC be good enough to let me get away with this?
#1
Let's say I want to set this up at my apartment:

https://www.youtube.com/watch?v=E_2YfsYp920

I would need the wifi pineapple tetra, which I have.

I'm thinking of setting this up but how do I really make sure I don't get caught with it? Is changing my MAC, both of the tetra and my PC, all it really takes?
Reply
#2
I wouldn't think so, I have seen several methods of detecting and defacing spoofed MAC addresses, including this one using ML
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4813856/
Reply
#3
(11-27-2018, 07:53 AM)enmafia2 Wrote: I wouldn't think so, I have seen several methods of detecting and defacing spoofed MAC addresses, including this one using ML
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4813856/

How would you go about it?
Reply
#4
You could instead of just spoofing some random mac, try to steal the mac address of another device of the network. Blend in. Honestly can't say whether it can be detected or not. But actually pretending to be another device on the network seems to be look more legitimate. Like http://carnal0wnage.attackresearch.com/2...fi_06.html
Reply
#5
(12-17-2018, 09:22 PM)Insider Wrote: You could instead of just spoofing some random mac, try to steal the mac address of another device of the network. Blend in. Honestly can't say whether it can be detected or not. But actually pretending to be another device on the network seems to be look more legitimate. Like http://carnal0wnage.attackresearch.com/2...fi_06.html

This is a bad idea for a number of reasons.

First and foremost - you're gonna have hella collisions. The router/switch won't be able to keep track of which device to send data to. It will be like your network connection on both devices will drop and pick up, drop and pick up.

There ARE times/types of attacks where this is done - But not if you want a stable connection for something like an Evil Portal. People connecting would be more likely to get a ERR_CONNECTION_RESET type error if you're trying to duplicate an active MAC address.


(11-27-2018, 04:20 AM)QMark Wrote: Let's say I want to set this up at my apartment:

https://www.youtube.com/watch?v=E_2YfsYp920

I would need the wifi pineapple tetra, which I have.

I'm thinking of setting this up but how do I really make sure I don't get caught with it? Is changing my MAC, both of the tetra and my PC, all it really takes?

Well, you can easily change your MAC address. But changing your MAC address won't keep you from getting caught whatsoever. People aren't caught via MAC address. At most it might keep you from being prosecuted if they can't prove the PC/device you're holding is the same one that they were looking for.

But this means that you'd also need to change the MAC addresses again between the time they found you, and the time they got your device for a physical check to see if it has the MAC address they want.

It also depends on how you're connecting. If it's via a wire connected to a router or switch, they may very well be able to tell what physical wire you're connected to - regardless of what your MAC address is. If they show up and you're connected to it - pretty obvious you're the one up to no good.

If it's wireless it's a bit harder - but they can theoretically triangulate your location based on the power output of the tetra, for example. whether someone does this really depends on the experience level and equipment of the person doing the looking. But they can find you (your device) this way if they want to.
Reply
#6
Double MAC spoofing easily done - Router and VM

1.) FreshTomato Router

https://www.freshtomato.org/

Simply click with the mouse on "Random" in the "MAC Address" menu. Advanced > MAC Address > Random

- Image -

[Image: image.php?di=WB17]


2.) All VM MAC s are automatically spoofed. Use a VM.

Now your MAC is spoofed on both sides. Router and operating system.
Reply
#7
(03-10-2019, 07:25 AM)MuddyBucket Wrote: If it's wireless it's a bit harder - but they can theoretically triangulate your location based on the power output of the tetra, for example. whether someone does this really depends on the experience level and equipment of the person doing the looking. But they can find you (your device) this way if they want to.
Depending on the environment this could be easier than you think. Take a look at /watch?v=o6WHhqDHSQ4 (and the two following videos), this could probably be hooked up to a wifi adapter to filter a single mac address. Doing this from just one position could be sufficient for some buildings so triangulation isn't even necessary in some cases.
Reply
#8
I have a reccomendation for you.

Hotel snack vending machiene. 3 Am. Open the Vending Machiene and Implant a Hacking Raspberry PI inside the vending machiene, somewhere deeply embedded, hookup to power somehow.

Make sure that even the vending machiene technition wont see it during his normal restocking of the machiene.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  how do I get a key log file to decrypt traffic on my home network? QMark 1 1,177 05-07-2021, 05:41 AM
Last Post: poppopret
  why won't it let me copy tftp into flash from CISCO router to server? QMark 1 6,370 06-01-2020, 07:54 PM
Last Post: Insider
  how to get my rogue AP working with ghost phisher? QMark 12 23,974 08-30-2018, 11:53 AM
Last Post: overfl0wN
  what is a good default CISCO Router to get? QMark 1 8,545 05-22-2018, 05:45 AM
Last Post: hack_beihai