MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer's identity, for any reason, and it is relatively easy.
The changing of the assigned MAC address may allow the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another network device. MAC spoofing is done for legitimate and illicit purposes alike.
New Hardware for Existing Internet Service Provider (ISP)
Most of the time, an ISP registers the client's MAC address for service and billing services. Since MAC addresses are unique and hard-coded on network interface controller (NIC) cards, when the client wants to connect a new gadget or change his/her existing gadget, the ISP will detect different MAC addresses and the ISP might not grant Internet access to those new devices. This can be circumvented easily by MAC spoofing. The client only needs to spoof the new device's MAC address to the MAC address that was registered by the ISP. In this case, the client spoofs his or her MAC address to gain Internet access from multiple devices. While this seems like a legitimate case, MAC spoofing new gadgets can be considered illegal if the ISP's user-agreement prevents the user from connecting more than one device to their service. Moreover, the client is not the only person who can spoof his or her MAC address to gain access to the ISP. Hackers can gain unauthorized access to the ISP via the same technique. This allows hackers to gain access to unauthorized services, and the hacker will be hard to identify because the hacker uses the client's identity. This action is considered an illegitimate use of MAC spoofing and illegal as well. However, it is very hard to track hackers utilizing MAC spoofing.
Fulfill Software Requirement
Some software can only be installed and run on systems with pre-defined MAC addresses as stated in the software end-user license agreement, and users have to comply with this requirement in order to gain access to the software. If the user has to install different hardware due to malfunction of the original device or if there is a problem with the user's NIC card, then the software will not recognize the new hardware. However, this problem can be solved using MAC spoofing. The user just has to spoof the new MAC address as to mimic the MAC address that was registered by the software. This activity is very hard to define as either legitimate or illegitimate reason for MAC spoofing. Legal issues might arise if the user grants access to the software on multiple devices simultaneously. At the same time, the user can obtain access to software for which he or she has not secured a license. Contacting the software vendor might be the safest route to take if there is a hardware problem preventing access to the software. Software may also perform MAC filtering because the software does not want unauthorized users to gain access to certain networks to which the software grants access. In such cases MAC spoofing can be considered a serious illegal activity and can be legally punished.
If a user chooses to spoof his or her MAC address in order to protect the user's privacy, this is called identity masking. One might wish to do this because on a Wi-Fi network connection MAC address are not encrypted. Even the secure IEEE 802.11i-2004 encryption method does not prevent Wi-Fi networks from sending out MAC addresses. Hence, in order to avoid being tracked, the user might choose to spoof the device's MAC address. However, hackers use the same technique to maneuver around network permissions without revealing their identity. Some networks use MAC filtering in order to prevent unwanted access. Hackers can use MAC spoofing to get access to a particular network and do some damage. Hackers' MAC spoofing pushes the responsibility for any illegal activity onto authentic users. As a result, the real offender may go undetected by law enforcement.
Unlike IP address spoofing, where senders spoof their IP address in order to cause the receiver to send the response elsewhere, in MAC address spoofing the response is usually received by the spoofing party (special 'secure' switch configurations can prevent the reply from arriving, or the spoofed frame being transmitted at all). However, MAC address spoofing is limited to the local broadcast domain.
|Wikibooks has a book on the topic of: Changing Your MAC Address|
- Cardenas, Edgar D. "MAC Spoofing--An Introduction". GIAC Security Essentials Certification. SANS Institute. Retrieved 8 February 2013.
- "MAC Spoofing". Royal Canadian Mounted Police. Research and Development Section in Collaboration with the NCECC’s Technology Unit. Retrieved 8 February 2013.
- Gupta, Deepak; Gaurav Tiwari (4 November 2009). "MAC SPOOFING AND ITS COUNTERMEASURES". International Journal of Recent Trends in Engineering 2 (4): 21. Retrieved 8 February 2013.
- Pahwa, Payal; Gaurav Tiwari; Rashmi Chhabra (January 2010). "Spoofing Media Access Control (MAC) and its Counter Measures". International Journal of Advanced Engineering & Application (India): 186–192.
- Indictment against Aaron Swartz