MAC address

(redirected from MAC spoofing)

MAC address

The hardware address of a device connected to a shared network medium. See also Media Access Control.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

MAC address

(Media Access Control address) The unique 48-bit serial number in the network circuitry of Ethernet and Wi-Fi devices that identifies that machine from every other globally. Also used in earlier Token Ring networks, the ID is assigned to vendors by the IEEE and "burned into" most network adapters (NICs) at the time of manufacture. However, some NICs are programmable, and the possibility of having the same MAC address is theoretically therefore not impossible. See MAC layer, OUI and binary values.


Logical IP and Physical Ethernet
Each machine in an IP network has an IP address assigned temporarily by software (see DHCP) or permanently by the network administrator. The physical address is assigned by the manufacturer of the hardware. See IP address.







Wireless MAC Addresses
Smartphones have unique MAC addresses for Wi-Fi and Bluetooth as in this iPhone example. Like Ethernet, Wi-Fi also requires an IP address, which can be viewed in Settings. Bluetooth does not use IP addresses.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
We have performed, succeeded in, and later evaluated MAC spoofing, data injection, and slave-address attack vectors, which are given in detail below.
To generate the MAC spoofing attack, the communication packets were first exported in the K12 text file format by Wireshark, which is a packet-sniffing program.
Alternatively, due to the erased configurations of the I/O units, the MAC spoofing attack cannot be performed if the PLC power is interrupted.
The trust-node approach is able to detect MAC spoofing, data injection, and slave-address access attack vectors, when they attempt to reach disapproved components by the created rule.
To see how financial institutions, like AAFCU, can monitor the behavior of user and non-user devices register for Great Bay Software's upcoming webinar "Detecting & Protecting Against MAC Spoofing Attacks" on April 20th, 2016 at 1pm CDT >> Register now.
General wireless security threats that may occur in business and social life using mobile devices include rogue evil twin APs, ad hoc networks, RF jamming, deauthentication, MAC spoofing, WEP key cracking, and sniffing [1, 2].
Threat classification Confidentiality Integrity Availability Rogue AP o o -- Ad hoc network o -- -- Evil twin/honeypot AP o o -- RF jamming -- -- o Deauthentication -- -- o MAC spoofing o o -- WEP key cracking o o -- Sniffing o -- -- o: effect, --: no effect.
In addition, a blogger can achieve an anonymous MAC address without purchasing anything and with minimal computer knowledge by a process known as MAC spoofing. Although the permanent MAC address of the network card cannot be changed, a user can tell the computer operating system that it is something different.
Attacks such as MAC spoofing and denial of service can be launched selectively on a client or an AP for potentially disrupting the entire WLAN.
As part of the implementation, engineers also added security measures to go beyond the wireless and networking equipment's standard protections, shielding Mobile's Wi-Fi users against identity theft, MAC spoofing and other threats.
(MAC addresses are like license plates the manufacturer assigns to each access point.) However, this method comes with a weakness: Many access points let the user easily hide the AP's true MAC address through "MAC spoofing." Spoofing lets the access point change its MAC address to any value the user desires.
In response to MAC spoofing, another method has evolved, providing more reliable results.