Mac spoofing on AE

flacochala

I`m in!!
Hi... well, this is the thing, i wanted to spoof the mac addr of my airport extreme card, and i read some data over google that i had to recompile my kernel with the etherspoof patch to do that.... well i did it, then change nvram boot variable to boot with my new ptached kernel, but the mac spoofing doesnt seems to work, i tried to spoof it with sudo ifconfig en1 ether macaddress, but throws me the same error that throwed me with the old kernel.... did i patch the kernel with the wrong patch, do i have to spoof my airport in another way??? whats wrong!!!!... thanxsss
 
It seems waiting is over for you, because for a few days there is now a solution to the Airport Extreme MAC spoofing problem. You can find more info about this on http://www.suspekt.org

I cannot wait to see his solution for RFMON/passive mode in KisMAC.
 
well... thanxs, the thing is i heard of the page as soon as wsa online because a freind was talking to ionic (stephan) while he was developing the project... if you dont want to mess around with hexeditors and other stuff, you can download a little c application that me and a friend built that spoof it for you.... is easy to install and run... stephan did all the hard work, we only coded it... you cand download it from
http://members.lycos.co.uk/hardapple/
http://www.appleb0x.com/downloads.htm
PD:this one is for you davidbrit2... remember what you told me... now anybody can spoof his mac... and i made a code to make it easier... hahha, your ap is no longer secure... jajajaja!!!!looser..
 
I see you've been looking for this solution since NOVEMBER! Just what is it that you were trying to hack? If you don't mind my asking....
 
flacochala said:
PD:this one is for you davidbrit2... remember what you told me... now anybody can spoof his mac... and i made a code to make it easier... hahha, your ap is no longer secure... jajajaja!!!!looser..

Grow up. MacOSX.com is a community for helping people and calm discussion. That post is immature and stupid.
 
flacochala said:
Hi... well, this is the thing, i wanted to spoof the mac addr of my airport extreme card, and i read some data over google that i had to recompile my kernel with the etherspoof patch to do that.... well i did it, then change nvram boot variable to boot with my new ptached kernel, but the mac spoofing doesnt seems to work, i tried to spoof it with sudo ifconfig en1 ether macaddress, but throws me the same error that throwed me with the old kernel.... did i patch the kernel with the wrong patch, do i have to spoof my airport in another way??? whats wrong!!!!... thanxsss

I assume that you are interested in securing your network or in learning. I can't help you with the latter. But, if you are interesting in securing, why not just use WPA? WPA is totally easy, but maybe you know that.
 
Back
Top