- [ Hacking 101 ] :: [ Outline ]
- [ Hacking 101 ] :: [ Introduction ]
- [ Hacking 101 ] :: [ The Basic Skills of Hacking ]
- [ Hacking 101 ] :: [ What We Mean By Hacking]
- [ Hacking 101 ] :: [ Do You Need A Handle? ]
- [ Hacking 101 ] :: [ HTML ]
- [ Hacking 101 ] :: [ Javascript ]
- [ Hacking 101 ] :: Mac Spoofing
- [ Hacking 101 ] :: Web Proxies
- [ Hacking 101 ] :: Unit 9 :: Learn Linux 4 :: sudo, nano, users and groups
- [ Hacking 101 ] :: VPNs
I’m going to take you through several different kinds of hiding and spoofing. Learn to use these to keep your hacking safe(er) and fun.
The first technique is MAC address spoofing.
When to use MAC spoofing
Use it when you’re connected to a local area network (LAN), which means you’re inside your target’s network. This won’t work over the Internet; this is for scanning and testing a local environment. Remember: Everything Is Logged. Don’t get caught with the computer that has the guilty MAC address!