(12-17-2018, 09:22 PM)Insider Wrote: You could instead of just spoofing some random mac, try to steal the mac address of another device of the network. Blend in. Honestly can't say whether it can be detected or not. But actually pretending to be another device on the network seems to be look more legitimate. Like http://carnal0wnage.attackresearch.com/2...fi_06.html
This is a bad idea for a number of reasons.
First and foremost - you're gonna have hella collisions. The router/switch won't be able to keep track of which device to send data to. It will be like your network connection on both devices will drop and pick up, drop and pick up.
There ARE times/types of attacks where this is done - But not if you want a stable connection for something like an Evil Portal. People connecting would be more likely to get a ERR_CONNECTION_RESET type error if you're trying to duplicate an active MAC address.
(11-27-2018, 04:20 AM)QMark Wrote: Let's say I want to set this up at my apartment:
https://www.youtube.com/watch?v=E_2YfsYp920
I would need the wifi pineapple tetra, which I have.
I'm thinking of setting this up but how do I really make sure I don't get caught with it? Is changing my MAC, both of the tetra and my PC, all it really takes?
Well, you can easily change your MAC address. But changing your MAC address won't keep you from getting caught whatsoever. People aren't caught via MAC address. At most it might keep you from being prosecuted if they can't prove the PC/device you're holding is the same one that they were looking for.
But this means that you'd also need to change the MAC addresses again between the time they found you, and the time they got your device for a physical check to see if it has the MAC address they want.
It also depends on how you're connecting. If it's via a wire connected to a router or switch, they may very well be able to tell what physical wire you're connected to - regardless of what your MAC address is. If they show up and you're connected to it - pretty obvious you're the one up to no good.
If it's wireless it's a bit harder - but they can theoretically triangulate your location based on the power output of the tetra, for example. whether someone does this really depends on the experience level and equipment of the person doing the looking. But they can find you (your device) this way if they want to.