Skip to main content

Changing Your MAC Address/Linux ,Powerful Metod

Changing Your MAC Address/Linux

Jump to navigationJump to search
Under GNU/Linux, the MAC address of a network interface card (NIC) can be changed by following the procedures below.
NOTE: MAC addresses used within this article are provided for example only. Substitute according to your requirements.
NOTE: Commands below MUST be executed with root privileges (e.g. prepended with "sudo "), in order for things to work!
/etc/init.d/networking stop
ifconfig eth0 hw ether 02:01:02:03:04:08
/etc/init.d/networking start
Execute "ifconfig eth0" to confirm.
The above should work on Debian, Ubuntu, and similar distributions. Alternatively, under RHEL/Fedora and possibly other GNU/Linux distributions (incl. CentOS and Scientific Linux), to disable and restart networking, one must stop and start /etc/init.d/network, instead of /etc/init.d/networking.
If you have iproute2 utilities installed, you may prefer to use the "ip" command, as follows:
/etc/init.d/network stop
ip link set eth0 address 02:01:02:03:04:08
/etc/init.d/network start
To confirm your setting, you may prefer to execute "ip link ls eth0" or "ip addr ls eth0" instead of "ifconfig eth0".
NOTE: You may not be able do this if using a DSL modem (depending on modem vendor or ISP).

Making Changes Permanent - Surviving a Reboot[edit]

In openSUSE and other SUSE-based systems (SUSE enterprise desktop\server, etc.) you can make changes "permanent" across reboots by adding an appropriate entry to the /etc/sysconfig/network/ifcfg-ethN file (ifcfg-eth0 for the first Ethernet interface config file, ifcfg-eth1 - for the second, etc.):
LLADDR=12:34:56:78:90:ab
In Red Hat Enterprise Linux (RHEL) and other similar systems (Fedora, CentOS, etc.) an easy way to make changes "permanent" across reboots is to add an appropriate entry to the /etc/sysconfig/network-scripts/ifcfg-ethN file (ifcfg-eth0 for the first Ethernet interface config file, ifcfg-eth1 - for the second, etc.):
MACADDR=12:34:56:78:90:ab
Note: in the file is a value HWADDR - This is not the same thing. Use MACADDR for permanent changes.
The HWADDR "directive is useful for machines with multiple NICs to ensure that the interfaces are assigned the correct device names regardless of the configured load order for each NIC's module. This directive should not be used in conjunction with MACADDR." ... The MACADDR "directive is used to assign a MAC address to an interface, overriding the one assigned to the physical NIC. This directive should not be used in conjunction with HWADDR."
Upper and lower case letters are accepted when specifying the MAC address, because the network function converts all letters to upper case.
You can test changes without restarting the system by executing:
service network restart
(WARNING: doing this will break all existing network connections!)
On Debian, Ubuntu, and similar systems, place the following in the appropriate section of /etc/network/interfaces (within an iface stanza, e.g., right after the gateway line) so that the MAC address is set when the network device is started:
hwaddress ether 02:01:02:03:04:08
On Gentoo you may achieve the same result by adding an entry to the global configuration file /etc/conf.d/net for each Ethernet card. Example for the eth0 device:
mac_eth0="12:34:56:78:90:ab"
You can also use the tool "GNU MACChanger" to change the MAC address under GNU/Linux.
To change MAC address during boot time with MACChanger, add the following line to your /etc/network/interfaces (example for the eth0 interface):
pre-up macchanger -m 12:34:56:78:90:AB eth0
 
 
 
sources: click here

Comments

Popular posts from this blog

install WiFi-Pumpkin (ex 3vilTwinAttacker) for almost any linux

WiFi-Pumpkin (ex 3vilTwinAttacker) WiFi-Pumpkin Description Framework for Rogue Wi-Fi Access Point Attack. WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad. Features Rogue Wi-Fi Access Point Deauth Attack Clients AP Probe Request Monitor DHCP Starvation Attack Credentials Monitor Transparent Proxy Windows Update Attack Phishing Manager Partial Bypass HSTS protocol Support beef hook ARP Poison DNS Spoof Patch Binaries via MITM Karma Attacks (support hostapd-mana) LLMNR, NBT-NS and MDNS poisoner (Responder) Pumpkin-Proxy (ProxyServer (mitmproxy API)) Capture images on the fly TCP-Proxy (with scapy) Plugins dns2proxy  - This tools offer a different features for post-explotation once you ch

How To Add The BlackArch Pentesting Repository To Arch Linux

BlackArch is a penetration testing distribution, similar to Kali Linux, but it’s built on top of Arch Linux. In reality, BlackArch is really a pre-configured Arch installation with an extra repository full of security tools. As a result, you can add the BlackArch repository to a regular install of Arch and gain access to all the same tools. In this tutorial you will learn: How to Download the BackArch Setup Script How to Verify The BlackArch Script How to Run The BlackArch Setup Script How to Install a Package from BlackArch How to Install an Entire Category from BlackArch Install BlackArch on Arch. Software Requirements and Conventions Used Software Requirements and Linux Command Line Conventions Category Requirements, Conventions or Software Version Used System Arch Linux Software BlackArch Repository Other Privileged access to your Linux system as root or via the sudo command. Conventions # - requires given linux commands to be

How Make Terminal look like Parrot's OS terminal?

copy the following codes and paste this code to file name bashrc which is locate in /home/username/ eg . /home/lazyboy/bashrc   copy code from  HERE or just copy following code ------------------------------------------------------------------------------------------------------------------------- # ~/.bashrc: executed by bash(1) for non-login shells. # see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) # for examples # If not running interactively, don't do anything [ -z "$PS1" ] && return # don't put duplicate lines in the history. See bash(1) for more options # ... or force ignoredups and ignorespace HISTCONTROL=ignoredups:ignorespace # append to the history file, don't overwrite it shopt -s histappend # for setting history length see HISTSIZE and HISTFILESIZE in bash(1) HISTSIZE=1000 HISTFILESIZE=2000 # check the window size after each command and, if necessary, # update the values of LINES and COLUMNS. shopt -s

How To Change Mac Address | Mac Spoofing in Kali / linux

there are mainly two ways to change your mac Method 1: kali@root# ifconfig {Nework Interface} down kali@root# macchanger {options} {network Interface} kali@root# ifconfig {Nework Interface} up kali@root# service network-manager restart     example:         kali@root# ifconfig wlan0 down         kali@root# macchanger -r wlan0         kali@root# ifconfig wlan0} up         kali@root# service network-manager restart Method 2: kali@root# /etc/init.d/networking stop kali@root# ifconfig {Network Interface} down kali@root# ifconfig {Network Interface} hw ether {any new mac} kali@root# /etc/init.d/networking start     example:         kali@root# /etc/init.d/networking stop         kali@root# ifconfig wlan0 down         kali@root# ifconfig wlan0 hw ether h0:38:99:25:6h:02         kali@root# /etc/init.d/networking start that's it.. to conform ,kali@root#macchanger -s wlan0

How to stop MAC address from changing after disconnecting? linux

Network-Manager will reset your mac address during the wifi scanning. To permanently change your mac address: Edit your  /etc/NetworkManager/NetworkManager.conf  as follows: [main] plugins=ifupdown,keyfile [ifupdown] managed=false [device] wifi.scan-rand-mac-address=no [keyfile] Edit your  /etc/network/interfaces  by adding the following line: pre-up ifconfig wlp68s0b1 hw ether xx:xx:xx:yy:yy:yy The  xx:xx:xx:yy:yy:yy  is the new mac address obtained from the output of  macchanger -A wlp68s0b1   sources: click here

How to set up your shell to use vi command editing mode in Terminal

Most shells that have a command line editing feature support Emacs key bindings. (a tiny subset) Up Ctrl + P Down Ctrl + N Left Ctrl + B Right Ctrl + F Home Ctrl + A End Ctrl + E Delete Ctrl + D Alternatively, you could set up your shell to use vi command editing mode, by adding   set -o vi to your shell startup file (e.g., ~/.bashrc ).  Then, for example, you can Use Esc  k  Enter to re-execute the previous command (same as !! ).  The minus key - also works as a "move up" command. Use Esc  k  k  k  k  k  k  k  k  k  k  k   k Enter or Esc  1 2  k  Enter to re-execute the 12th previous command (same as !-12 ). Use Esc and a motion command (i.e., k , suitably repeated), and then edit the bash command line you find there.  Remember, you will still be in vi command mode, so you will need to use a vi editing command (e.g., I , A , C , R , or one of their lowercase counterparts) to actually add to the command from history. So, for examp

How to Connect Wi-Fi from Linux Terminal Using Nmcli Command

There are several command-line tools for managing a wireless network interface in Linux systems. A number of these can be used to simply view the wireless network interface status (whether it is up or down , or if it is connected to any network), such as iw , iwlist , ip , ifconfig and others. And some are used to connect to a wireless network, and these include: nmcli , is a command-line tool used to create, show, edit, delete, enable, and disable network connections, as well as control and display network device status. First start by checking the name of your network device using the following command. From the output of this command, the device name/interface is wlp1s0 as shown. $ iw dev phy#0 Interface wlp1s0 ifindex 3 wdev 0x1 addr 38:b1:db:7c:78:c7 type managed     Next, check the Wi-Fi device connection status using the following command.   $ iw wlp2s0 link Not connected. From the output above the device is not connected to any network, run the

How To Install Brave Browser On Debian Linux

installing brave on Debian (specially on kali) linux is not an easy. so it can be painful. but suppose you install it any how but it is still painful to open brave. in fact, you can't open it without using --no-sandbox .And using --no-sandbox to open brave is extremely dangerous for your machine security. after many research, i found a very simple solution.   STEP1: On machine,  follow the  official Ubuntu instructions and only change the following step: echo "deb [arch=amd64] https://brave-browser-apt-release.s3.brave.com/ $UBUNTU_CODENAME main" | sudo tee /etc/apt/sources.list.d/brave-browser-release- ${UBUNTU_CODENAME} .list to this: echo "deb [arch=amd64] https://brave-browser-apt-release.s3.brave.com/ bionic main" | sudo tee /etc/apt/sources. list .d/brave-browser-release-bionic. list STEP2: Then add the following in  /etc/sysctl.d/00-local-userns.conf : kernel.unprivileged_userns_clone = 1   STEP3: finally run the following comma

Random Posts