Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
37 views10 pages

Spoofing of IP and MAC Addresses (Student Copy)

Spoofing is the act of falsifying data to deceive others, with forms including IP and MAC spoofing. IP spoofing involves sending data from a false source address, often using web-based proxies or VPNs, while MAC spoofing changes a device's MAC address to impersonate another device. Tools like TMAC and Macchanger are used for MAC address spoofing on Windows and Linux, respectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views10 pages

Spoofing of IP and MAC Addresses (Student Copy)

Spoofing is the act of falsifying data to deceive others, with forms including IP and MAC spoofing. IP spoofing involves sending data from a false source address, often using web-based proxies or VPNs, while MAC spoofing changes a device's MAC address to impersonate another device. Tools like TMAC and Macchanger are used for MAC address spoofing on Windows and Linux, respectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Spoofing of

IP and MAC
Addresses
WHAT IS SPOOFING?
SPOOFING REFERS TO THE ACT OF
FALSIFYING DATA OR INFORMATION
WITH THE INTENT TO DECEIVE OR TRICK
SOMEONE.
This can take various forms including IP spoofing, MAC
spoofing, email spoofing, etc but the common element is
that the attacker is trying to make something appear as
something it is not.
IP Spoofing
IP spoofing is a technique in which an attacker sends data packets from a false
(or "spoofed") source address with the help of proxies in order to deceive the
recipient about the originating source.

METHODS OF IP SPOOFING

WEB-BASED PROXY

VPN
WEB-BASED PROXY
Website-based service that allows users to access
the internet indirectly by routing their web traffic
through a server, typically located in a different
location.
This server acts as an intermediate proxy between
the user's device and the websites they want to
visit.
Examples:
Proxyium - https://proxyium.com
ProxySite.com - https://www.proxysite.com
Hide.me - https://hide.me/en/proxy
VPN
Virtual Private Network (VPN) is a technology that
creates a secure and encrypted connection over a less
secure network, such as the internet.
It masks the user's IP address by routing their
internet traffic through their private VPN servers.
Examples:
Proton VPN - https://protonvpn.com/
Nord VPN - https://nordvpn.com/
MAC Address
A unique identifier assigned to the network
interface of a device for communication on
a network.
Also commonly known as the permanent
address or physical address.
It’s a 48-bit address.
Contains hexadecimal characters.
Example:

0A:1B:2C:3D:4E:5F
MAC Spoofing
MAC spoofing is the process of changing the MAC address of a device to
impersonate another network device.

CHECKING EXISTING MAC ADDRESS

For Windows :
Open up cmd and run the command <ipconfig /all>
For Linux :
Open up the terminal and run the command <ifconfig>
FOR WINDOWS
USING TMAC

We need to install a 3rd-party


application such as TMAC or SMAC.
Once installed we can either set a
random MAC address or even one of
our own choice.
FOR LINUX
USING MACCHANGER
Macchanger is an inbuilt command line utility in Kali Linux which can be used to spoof the MAC Address
of it’s interfaces.
Syntax: macchanger <option> <interface>
To learn more about macchanger always use the ‘--help’ option.
THANK YOU

You might also like