true? spoof mac

Discussion in 'other security issues & news' started by Raven_X, Jan 3, 2011.

Thread Status:
Not open for further replies.
  1. Raven_X

    Raven_X Registered Member

    Joined:
    Dec 8, 2010
    Posts:
    36
    I've heard that people can spoof mac address and example my neighbours can use my mac address and surf on my Wireless connection router ?
    they do not need the WPA2-key because they fix SAME mac address that i use/have but they fix it on their laptop and in that way they can use my wireless network, it is like hacking,
    So i want to know if this is true and possible? because i've heard people can do this.
     
  2. Cudni

    Cudni Global Moderator

    Joined:
    May 24, 2009
    Posts:
    6,963
    Location:
    Somethingshire
    Without a correct WPA/WPA 2 key, no access.
     
  3. Raven_X

    Raven_X Registered Member

    Joined:
    Dec 8, 2010
    Posts:
    36
    are you 100% sure about this ?
    because i've heard and seen that lurk a MAC-address then they will be able to surf with my connection BUT as i said only if they can trick/Lurk spoof the Mac address !!
     
  4. Cudni

    Cudni Global Moderator

    Joined:
    May 24, 2009
    Posts:
    6,963
    Location:
    Somethingshire
    not they, not anybody can circumvent WPA/WPA2 and gain a connection via spoofed mac address. Or any other way unless somebody bothers to brute force a short password key. This will not work for a complex random characters based key (not to mention 63 long one)
     
  5. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,645
    Location:
    USA
    Someone correct me if I'm wrong...

    Your WPA2 key is not just an access code that gets you into the router, all of your traffic is encrypted based on that key. You cannot just piggyback someone else's MAC and get in, you would still need that key to decrypt the traffic. So ther is no chance you can get into a WPA2 network just by spoofing a MAC.
     
  6. Raven_X

    Raven_X Registered Member

    Joined:
    Dec 8, 2010
    Posts:
    36
    well i'm sorry if i am wrong but thats what i've heard seen and read that they CLONE spoof their mac and make it looks like mine and it is like mine 00:EE:** etc and in that way they can surf and all this thanks to a software for hacking i think, it's a Clone-Hack software...
    But all you guys says it is impossible right ? so i don't have to worry ?
     
  7. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,280
    Location:
    New England
    Raven_X, you definitely do not have to worry. The security of using a strong key in WPA(AES)/WPA2 can not be bypassed by simple MAC spoofing as others have stated above. Think about it... if it was that easy to bypass the encryption security, no one would want to use wireless. A spoofed MAC address does not remove the requirement for the correct key.

    For more information on this and other wireless security information, see this thread:

    https://www.wilderssecurity.com/showthread.php?t=272327
     
  8. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,645
    Location:
    USA
    1. You have a secured network with WPA2 and no MAC filtering.
    You have a house with a locked door and no guard. You need a key to get in. Nobody cares what your name is (MAC), you just need a key you don't have. Here it does not matter what you MAC is, just the key.


    2. You have a secured network with WPA2 and a MAC filter.
    You have a house with a locked door and a guard checking IDs. You show the guard your ID and if you are on the list you go to the door, where you still need your key. If your neighbor has a fake ID and gets past the guard (MAC spoof) he still needs the key to get in the door. He doesn't have one. Too bad for him.


    3. You have an open wireless network with MAC filtering.
    You have a house with a guard and an unlocked door. You show the guard your ID and go in the door. You neighbor has a fake ID that says he is you. He gets in the door because it is open and his ID says he is you. (MAC spoofing with no security).

    I assume your setup is #1 or #2. #3 is the only situation where a spoofed MAC will get you in, and we have already established that this is not your setup. I hope this clears it up rather than making it more confusing. It's the best thing I could think of to explain it.
     
  9. Raven_X

    Raven_X Registered Member

    Joined:
    Dec 8, 2010
    Posts:
    36
    thank you all for helping me and especialy thanks to: LowWaterMark.

    But if the person CLONED same MAC adress as i use and he Clone same as it's own pc then he still won't be able to surf with my wireless right ?
    and b.t.w my key is: you_Wont_Get_it_114599 both with small and large words , is this enough ?

    ok thank you =)
     
  10. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,645
    Location:
    USA
    The cloned MAC address won't get him in but the key you just gave will. If that is not your actual key, yes that format would be plenty safe. If it is your actual key, change it.
     
  11. Raven_X

    Raven_X Registered Member

    Joined:
    Dec 8, 2010
    Posts:
    36
  12. redgrum

    redgrum Registered Member

    Joined:
    Nov 16, 2010
    Posts:
    50
    That does not say anything about a mac address being used to circumvent encryption - you can crack weak passwords, and in theory any password, but simple mac address cloning would not prevent you from having to do this in the first place.
     
  13. Cudni

    Cudni Global Moderator

    Joined:
    May 24, 2009
    Posts:
    6,963
    Location:
    Somethingshire
    they can't hack wpa and they can only brute force (guess) simple passwords.
     
  14. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,873
    Location:
    Outer space
    As Cudni said it is only bruteforcing, not hacking. Plus that is WPA, not WPA2.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.