Cloning Mac Address Results Review

Md. Abdullah Yusuf Imam, Mr. Prodip Kumar Biswas

Abstract


Every network interface has a media access control (MAC) address. Network interface cards come from the factory with a unique MAC address associated with the hardware. Most network cards and routers allow one to set a custom MAC address [1], overriding the MAC address present in the hardware. Cloning a MAC address, or changing the MAC address on one device to the MAC address associated with a different device, can be useful when an Internet connection is associated with a particular MAC address and that MAC address is no longer existed in the network. On the other hand if the ISP blocked the Mac address of the original device, changing Mac address is efficient way to communicate to the internet. Another function of cloning MAC address is used to jam the network with the IP address conflict associated with two devices.   


Keywords


Mac; Ip; Router; Clone; Address.

Full Text:

PDF

References


Robert M. Metcalfe; David R. Boggs (July 1976). "Ethernet: Distributed Packet Switching for Local Computer Networks". Communications of the ACM.19 (5): 395–404. Archived from the original on 2007-08-07.

Laura Acevedo. "The Disadvantages of Wired Technology".Chron.

Margaret Rouse. "personal area network (PAN)". Tech Target.Retrieved January 29, 2011.

Peterson, L.L.; Davie, B.S. (2011). Computer Networks: A Systems Approach (5th ed.). Elsevier. p. 372.ISBN 978-0-1238-5060-7

Vanhoef Mathy and Matte Célestin and Cunche Mathieu and Cardoso Leonardo and Piessens Frank. "Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms". Retrieved 2018-08-22.

Martin Jeremy and Mayberry Travis and Donahue Collin and Foppe Lucas and Brown Lamont and Riggins Chadwick and Rye Erik C and Brown Dane. "A study of MAC address randomization in mobile devices and when it fails" (PDF). 2017. Retrieved 2018-08-22.

Matte Célestin and Cunche Mathieu and Rousseau Franck and Vanhoef Mathy. "Defeating MAC address randomization through timing attacks". Retrieved 2018-08-22.

"Hidden network no beacons". Security stack exchange.com. Retrieved 16 October 2016.


Refbacks

  • There are currently no refbacks.


 

 
  
 

 

  


About IJSBAR | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJSBAR is published by (GSSRR).