Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
GIAC Security Essentials Certification (GSEC)
Practical Assignment Version 1.4b--Option 1
MAC Spoofing--An Introduction
Edgar D Cardenas
23 August 2003
This paper covers what MAC spoofing is; why people use it; how it is
accomplished; how to prevent it; and, what advantages MAC spoofing provides
in penetration testing. MAC spoofing does not receive the same publicity as IP
spoofing, but it is a more powerful and versatile tool in regards to breaking into a
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.