SlideShare a Scribd company logo
Fundamental
of
Hacking
A : Advanced
B: Be Smart and Safe
- Raval Sneh
- MCA 4
- Dept. Of Computer Science
1 21-03-2014
21-03-2014
- Raval Sneh
2
Computer
IP
IPV4 IPV6
MAC
 A Media Access Control address (MAC address) is a unique
identifier assigned to network interfaces for communications on
the physical network segment.
 MAC addresses are used for numerous network technologies
and most IEEE 802 network technologies including Ethernet.
Logically, MAC addresses are used in the Media Access
Control protocol sub-layer of the OSI reference model.
 MAC addresses are most often assigned by the manufacturer of
a network interface card (NIC) and are stored in its hardware, the
card's read-only memory, or some other firmware mechanism.
 It may also be known as an Ethernet hardware
address(EHA), hardware address or physical address
- Raval Sneh
3 21-03-2014
 The standard (IEEE 802) format for printing MAC-48
addresses in human-friendly form is six groups of
two hexadecimal digits, separated by hyphens (-) or
colons (:), in transmission order, e.g. 01-23-45-67-89-
ab, 01:23:45:67:89:ab.
 This form is also commonly used for EUI-64.
 Another convention commonly used by networking
equipment uses three groups of four hexadecimal digits
separated by dots (.), e.g. 0123.4567.89ab; again in
transmission order.
21-03-2014
- Raval Sneh
4
 Although intended to be a permanent and globally unique
identification, it is possible to change the MAC address on
most of today's hardware, an action often referred to
as MAC spoofing.
 A host cannot determine from the MAC address of another
host whether that host is on the same link (network
segment) as the sending host, or on a network
segment bridged to that network segment.
 In TCP/IP networks, the MAC address of an interface can
be queried knowing the IP address using the Address
Resolution Protocol (ARP) for Internet Protocol Version 4
(IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6.
- Raval Sneh
5 21-03-2014
21-03-2014
- Raval Sneh
6
21-03-2014
- Raval Sneh
7
 Setting first octet "02" actually sets the b2 bit
indicating that the MAC address is locally
administered. Looking at this MAC address
thus indicates that the MAC address is changed
by local machine administrator. But, its still
good if you just want to hide your original MAC
address instead of spoofing someone's MAC
address.
21-03-2014
- Raval Sneh
8
The following technologies use the MAC-48 identifier
format:
 Ethernet
 802.11 wireless networks
 Bluetooth
 IEEE 802.5 token ring
 most other IEEE 802 networks
 FDDI
 ATM (switched virtual connections only, as part of
an NSAP address)
 Fibre Channel and Serial Attached SCSI (as part of
a World Wide Name)
- Raval Sneh
9 21-03-2014
 http://www.technitium.com/
 www.wikipedia.com
21-03-2014
- Raval Sneh
10
21-03-2014
- Raval Sneh
11

More Related Content

What's hot

06 mac address
06 mac address06 mac address
06 mac address
Asmat ullah
 
Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
Universitas Teknokrat Indonesia
 
Basic networking course
Basic networking courseBasic networking course
Basic networking course
LuxoftTraining
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
NetProtocol Xpert
 
IP classes
IP classesIP classes
IP classes
Meenakshi Paul
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
Hexa Howe
 
Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)
MuhammadUsman1853
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
KathirKathiresan4
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
junnubabu
 
Firewall
FirewallFirewall
Firewall
Muuluu
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
Taymoor Nazmy
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
Marvin Bronoso
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
aibad ahmed
 
Data communication
Data communicationData communication
Data communication
Rakibul Islam
 
LAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC AddressLAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC Address
MD. Naimur Rahman
 
IEEE 80211 ah
IEEE 80211 ahIEEE 80211 ah
IEEE 80211 ah
RoshielaMaePagtaccun
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
Mahmmoud Mahdi
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
MuhammadUsman1853
 

What's hot (20)

06 mac address
06 mac address06 mac address
06 mac address
 
Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
 
Basic networking course
Basic networking courseBasic networking course
Basic networking course
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
IP classes
IP classesIP classes
IP classes
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
 
Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Firewall
FirewallFirewall
Firewall
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Switch & hub
Switch & hubSwitch & hub
Switch & hub
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
Data communication
Data communicationData communication
Data communication
 
LAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC AddressLAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC Address
 
IEEE 80211 ah
IEEE 80211 ahIEEE 80211 ah
IEEE 80211 ah
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 

Viewers also liked

bgp protocol
 bgp protocol bgp protocol
bgp protocol
Sukanya Sanyal
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)Jasim Alam
 
IPV6 ppt
IPV6 pptIPV6 ppt
IPV6 ppt
justdoitkhan
 
IPv6
IPv6IPv6
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
Gorantla Mohanavamsi
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
Rekha Yadav
 

Viewers also liked (7)

bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
 
IPV6 ppt
IPV6 pptIPV6 ppt
IPV6 ppt
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
IPv6
IPv6IPv6
IPv6
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 

Similar to How to change mac address

Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
Jiunn-Jer Sun
 
Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1
arun0501
 
Arpwatch
ArpwatchArpwatch
Arpwatch
Santosh Shah
 
MAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptxMAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptx
RohitKumarShah6
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
ShehanMarasinghe1
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
prachi67
 
What networking challenges does for the Open Ethernet address and ho.pdf
What networking challenges does for the Open Ethernet address and ho.pdfWhat networking challenges does for the Open Ethernet address and ho.pdf
What networking challenges does for the Open Ethernet address and ho.pdf
malavshah9013
 
hardware addressing
hardware addressinghardware addressing
hardware addressing
Sagar Gor
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
AssemNazirova2
 
Networking
NetworkingNetworking
NetworkingRashmi
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
NguyenLe340487
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
Shreehari Dhat
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Đồng Quốc Vương
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
Siena Perry
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC
 
Ip address
Ip addressIp address
Ip address
MdAnikKhan
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Mohd. Ahmad Siddiqi
 

Similar to How to change mac address (20)

Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
 
Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1
 
Arpwatch
ArpwatchArpwatch
Arpwatch
 
MAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptxMAC address Rohit Kumar Shah.pptx
MAC address Rohit Kumar Shah.pptx
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
 
What networking challenges does for the Open Ethernet address and ho.pdf
What networking challenges does for the Open Ethernet address and ho.pdfWhat networking challenges does for the Open Ethernet address and ho.pdf
What networking challenges does for the Open Ethernet address and ho.pdf
 
hardware addressing
hardware addressinghardware addressing
hardware addressing
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
 
Networking
NetworkingNetworking
Networking
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
Ip address
Ip addressIp address
Ip address
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 

More from Sneh Raval

Android Application And Unity3D Game Documentation
Android Application And Unity3D Game DocumentationAndroid Application And Unity3D Game Documentation
Android Application And Unity3D Game Documentation
Sneh Raval
 
Artificial intelligency & robotics
Artificial intelligency & roboticsArtificial intelligency & robotics
Artificial intelligency & roboticsSneh Raval
 
Artificial intelligency & robotics
Artificial intelligency & roboticsArtificial intelligency & robotics
Artificial intelligency & roboticsSneh Raval
 
Techno world
Techno worldTechno world
Techno world
Sneh Raval
 
Mozillaseabird
MozillaseabirdMozillaseabird
MozillaseabirdSneh Raval
 

More from Sneh Raval (6)

Android Application And Unity3D Game Documentation
Android Application And Unity3D Game DocumentationAndroid Application And Unity3D Game Documentation
Android Application And Unity3D Game Documentation
 
Artificial intelligency & robotics
Artificial intelligency & roboticsArtificial intelligency & robotics
Artificial intelligency & robotics
 
Project loon
Project loonProject loon
Project loon
 
Artificial intelligency & robotics
Artificial intelligency & roboticsArtificial intelligency & robotics
Artificial intelligency & robotics
 
Techno world
Techno worldTechno world
Techno world
 
Mozillaseabird
MozillaseabirdMozillaseabird
Mozillaseabird
 

Recently uploaded

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

How to change mac address

  • 1. Fundamental of Hacking A : Advanced B: Be Smart and Safe - Raval Sneh - MCA 4 - Dept. Of Computer Science 1 21-03-2014
  • 3.  A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.  MAC addresses are used for numerous network technologies and most IEEE 802 network technologies including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.  MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism.  It may also be known as an Ethernet hardware address(EHA), hardware address or physical address - Raval Sneh 3 21-03-2014
  • 4.  The standard (IEEE 802) format for printing MAC-48 addresses in human-friendly form is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:), in transmission order, e.g. 01-23-45-67-89- ab, 01:23:45:67:89:ab.  This form is also commonly used for EUI-64.  Another convention commonly used by networking equipment uses three groups of four hexadecimal digits separated by dots (.), e.g. 0123.4567.89ab; again in transmission order. 21-03-2014 - Raval Sneh 4
  • 5.  Although intended to be a permanent and globally unique identification, it is possible to change the MAC address on most of today's hardware, an action often referred to as MAC spoofing.  A host cannot determine from the MAC address of another host whether that host is on the same link (network segment) as the sending host, or on a network segment bridged to that network segment.  In TCP/IP networks, the MAC address of an interface can be queried knowing the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4 (IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. - Raval Sneh 5 21-03-2014
  • 8.  Setting first octet "02" actually sets the b2 bit indicating that the MAC address is locally administered. Looking at this MAC address thus indicates that the MAC address is changed by local machine administrator. But, its still good if you just want to hide your original MAC address instead of spoofing someone's MAC address. 21-03-2014 - Raval Sneh 8
  • 9. The following technologies use the MAC-48 identifier format:  Ethernet  802.11 wireless networks  Bluetooth  IEEE 802.5 token ring  most other IEEE 802 networks  FDDI  ATM (switched virtual connections only, as part of an NSAP address)  Fibre Channel and Serial Attached SCSI (as part of a World Wide Name) - Raval Sneh 9 21-03-2014