Cloud GCP Database
Cloud GCP Database
Counter measures
What is MAC address?
• A MAC address is a series of characters that identifies a
particular device on a network.
• MAC stands for Media Access Control.
• When a device is produced, the manufacturer assigns it a
MAC address.
• Unlike IP addresses, which can be dynamic, MAC addresses
never change. It’s easier to identify a device on a network
by looking at the MAC addresses.
• The MAC address is hardcoded onto a device so it cannot be
changed at the hardware level. It can be changed at the
software level, though.
What is a MAC address (media access
control address)?
• A MAC address (media access control address) is a 12-
digit hexadecimal number assigned to each device connected to the
network.
• Primarily specified as a unique identifier during device manufacturing,
the MAC address is often found on a device's network interface card (
NIC).
• A MAC address is required when trying to locate a device or when
performing diagnostics on a network device.
• Each device on a network has a unique media access control (MAC)
address, sometimes called a physical address.
• Networking two devices requires an IP and MAC address. Every device’s NIC
has a Media Access Control (MAC) address.
• As a cybersecurity professional, you should know that no two devices may have
the same MAC address since this identification is unique. The hexadecimal
encoding 00:0a:95:9d:67:16 is present in every device.
• The 12-digit alphanumeric identifier comprises 48 bits, with the initial 24 bits
allocated for the OUI (Organization Unique Identifier), while the remaining 24
bits are designated for NIC/vendor-specific data.
• It operates on the OSI model’s data link layer.
• It is supplied by the device’s manufacturer and included in its NIC, which is
ideally fixed and cannot be modified.
• A logical address is connected to a physical or MAC address using the ARP
protocol.
• You can fake a device’s MAC address so it cannot be seen by
public networks. This is known as MAC spoofing.
What is spoofing?
• In the context of cybersecurity, spoofing is the act
of impersonating another entity to earn our trust,
obtain access to our systems, steal data, steal
money, or transmit malware.
What is MAC Spoofing?
• Each network-connected device possesses a distinct Media Access
Control (MAC) address, which serves as an exclusive identifier
assigned to its network interface card.
• Malicious actors possess the ability to utilize the method commonly
known as MAC spoofing to modify the MAC address of a device in
order to imitate another device present on the network.
• The vulnerability in question allows the attacker to bypass network
security protocols that are dependent on MAC addresses, such as
MAC filtering or access control based on MAC addresses.
Is spoofing a MAC address bad?
• Spoofing a MAC address is legal and can be used for
legitimate purposes, such as avoiding being tracked.
• You can also do it safely without having to use any
external software.
• Often, however, MAC address spoofing is used for
wicked purposes. It’s called a MAC spoofing attack
MAC Filtering
• MAC filtering is a security method used in computer
networks to restrict access to network resources based
on the MAC address, a distinctive number that is
provided to each network interface card (NIC)
• Organizations can improve their network security by
limiting unauthorized devices from connecting to the
network and accessing critical data or resources by
filtering network access at the MAC address level.
MAC spoofing is a commonly employed tactic by malicious actors to alter the Media Access
Control (MAC) address of their device to mimic that of another device present on the
network. The aforementioned vulnerability enables the assailant to surpass network security
measures such as MAC filtering and MAC-based access controls.
Techniques Used in MAC Spoofing Attacks
Cloning
• The act of cloning involves the replication of a legitimate device’s MAC
address for the purpose of masquerading as that device on the network.
In instances where a perpetrator has unfettered physical access to a
target device, such as a router or switch, this method is often employed.
Techniques Used in MAC Spoofing Attacks
Randomizing a MAC address
• Randomization involves generating a new MAC address and using it to
impersonate a network device. When an attacker lacks access to a
trusted device to copy its MAC address, they frequently apply this
method.
Tools and Software Used for MAC Spoofing Attacks
MAC spoofing attacks are carried out by hackers using a range of
tools and software, some of which are easily accessible online:
• MAC address changer
• The utilization of a freely available software, namely MAC Address
Changer, empowers users to alter the MAC address of their network
interface card (NIC). MAC address spoofing is a potential vulnerability
that can be leveraged by threat actors to compromise the network and
obtain unauthorized access.
• Ettercap
• Ettercap is a robust software application utilized for scrutinizing
network traffic and conducting security assessments. Additionally, by
manipulating MAC addresses and intercepting network traffic,
cybercriminals can carry out MAC spoofing attacks.
• Other tools: Cain and Abel, Netcut, and SMAC are additional popular tools
for MAC spoofing attacks. MITM attacks can be conducted using these
tools, which can also be used to clone or randomize MAC addresses.
2. Do not click on links or download files in unsolicited emails from unknown senders. If there is a possibility that the email is accurate, contact the
3. Sign in from a different window or tab. Do not click the offered link if you get a suspicious email or text message demanding that you log in to
your account and perform some action, such as verifying your details. Instead, create a new tab or window and browse the site. Alternatively, you
4. Utilize the telephone. If you’ve received a strange email purportedly from a friend, don’t be hesitant to phone or text the sender to verify that they
sent the email. This is particularly true if the sender makes an unusual request, such as, “Please purchase 100 iTunes gift cards and provide me the
5. Windows displays file extension names. By default, Windows does not display file extensions, but you can alter this by choosing the “View” tab in
File Explorer and selecting the checkbox to display file extensions. While this will not prevent fraudsters from spoofing file extensions, you will at
least be able to identify faked extensions and avoid opening infected files.
6. Invest in reliable antivirus software. Don’t panic if you click on a malicious link or file; a competent antivirus application will warn you of the
danger, block the download, and prevent malware from infiltrating your system or network. Malwarebytes, for instance, offers free trials of its