MAC address

(redirected from MAC spoofing)

MAC address

The hardware address of a device connected to a shared network medium. See also Media Access Control.

MAC address

(Media Access Control address) The unique 48-bit serial number in the network circuitry of Ethernet and Wi-Fi devices that identifies that machine from every other globally. Also used in earlier Token Ring networks, the ID is assigned to vendors by the IEEE and "burned into" most network adapters (NICs) at the time of manufacture. However, some NICs are programmable, and the possibility of having the same MAC address is theoretically therefore not impossible. See MAC layer, OUI and binary values.


Logical IP and Physical Ethernet
Each machine in an IP network has an IP address assigned temporarily by software (see DHCP) or permanently by the network administrator. The physical address is assigned by the manufacturer of the hardware. See IP address.







Wireless MAC Addresses
Smartphones have unique MAC addresses for Wi-Fi and Bluetooth as in this iPhone example. Like Ethernet, Wi-Fi also requires an IP address, which can be viewed in Settings. Bluetooth does not use IP addresses.
References in periodicals archive ?
To see how financial institutions, like AAFCU, can monitor the behavior of user and non-user devices register for Great Bay Software's upcoming webinar "Detecting & Protecting Against MAC Spoofing Attacks" on April 20th, 2016 at 1pm CDT >> Register now.
In addition, a blogger can achieve an anonymous MAC address without purchasing anything and with minimal computer knowledge by a process known as MAC spoofing.
Attacks such as MAC spoofing and denial of service can be launched selectively on a client or an AP for potentially disrupting the entire WLAN.
As part of the implementation, engineers also added security measures to go beyond the wireless and networking equipment's standard protections, shielding Mobile's Wi-Fi users against identity theft, MAC spoofing and other threats.
With MAC spoofing, wireless hacking, and unapproved connections constantly bombarding today's wireless networks, AirMagnet's products are a valuable weapon in the armament available to IT professionals," notes Frost & Sullivan Research Analyst James Brehm.
New security and policy features to protect against MAC spoofing and avoid static IP address mapping of web destinations
The wireless attacks we saw--jamming, de-authentication, denial-of-service, MAC spoofing, fake and soft APs--were to be expected, particularly at a hacker conference," said Bruce Hubbert, an AirMagnet engineer who attended DefCon.
320 cases of MAC spoofing likely used for malicious activity