Sponsored Content
Full Discussion: ethernet mac spoofing
Operating Systems OS X (Apple) ethernet mac spoofing Post 302499755 by andrewust on Friday 25th of February 2011 10:23:45 AM
Old 02-25-2011
I am sure this mac address is the only authorized one for that cable, it's fixed
 

9 More Discussions You Might Find Interesting

1. IP Networking

How to Achive IP address through MAC(Ethernet) address

Hi sir, i want to make such programe which takes MAC(Ethernet) address of any host & give me its IP address....... but i'm nt getting that how i can pass the MAC address to Frame........ Please give me an idea for making such program... Thanks & regards Krishna (3 Replies)
Discussion started by: krishnacins
3 Replies

2. UNIX for Dummies Questions & Answers

How to change the MAC adress in ethernet adapter for SUN

I have installed in the server a quad ethernet adapter, I'm using two interfaces with two different IP networks, both interfaces are connected to a switch, the switch report that is receiving the same MAC address in both ports so must of the times I have connectivity problems. Any idea to change... (1 Reply)
Discussion started by: mono673
1 Replies

3. UNIX for Advanced & Expert Users

Spoofing paths.

There is a program that I am trying to run on a shell account. It depends on another program, which I have also copied to the shell account. Both are in my home directory, yet the first program has a different path hardcoded into it, which I cannot use because of permissions problems. How can I... (3 Replies)
Discussion started by: fahadsadah
3 Replies

4. UNIX for Dummies Questions & Answers

Spoofing a From Address in SMTP

Hi, I am currently using Mailx to send a mail message from my unix account via an SMTP relay. This is working ok. However from the recipient end the FROM address they see on mails received is <unix account>@<domain> eg prod@liveserver.com Is there anyway I can spoof this FROM address from the... (1 Reply)
Discussion started by: jimthompson
1 Replies

5. Cybersecurity

MAC Address spoofing

There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies

6. Solaris

MAC spoofing a virtual NIC on Solaris 5.0

Hi everybody! I'm facing a problem and I doubt about the solution (I'm not very familiar with old *NIXs). An external network supplier (let's call them "telco") just installed new communication components that filters MAC addresses. I have a Solaris 5 server, with 1 NIC (hte0) which is... (6 Replies)
Discussion started by: Isharfoxat
6 Replies

7. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

8. AIX

vio server ethernet to vio client ethernet(concepts confusing)

Hi In the vio server when I do # lsattr -El hdisk*, I get a PVID. The same PVID is also seen when I put the lspv command on the vio client partition. This way Im able to confirm the lun using the PVID. Similarly how does the vio client partition gets the virtual ethernet scsi client adapter... (1 Reply)
Discussion started by: newtoaixos
1 Replies

9. Programming

Ethernet programming (not MAC, LLC, but Preamble, SFD and FCS)

Hello everybody, I've been working with raw sockets since long time ago. I've coded TCP/UDP, ICMP/IP and ARP applications, all resting encapsulated over relative "raw" ethernet frames; but in reality, Ethernet uses MAC addresses and LLC protocol codes (from layer 2) and that's the maximum access... (1 Reply)
Discussion started by: Zykl0n-B
1 Replies
skbmod action in tc(8)                                                 Linux                                                skbmod action in tc(8)

NAME
skbmod - user-friendly packet editor action SYNOPSIS
tc ... action skbmod { [ set SETTABLE ] [ swap SWAPPABLE ] [ CONTROL ] [ index INDEX ] } SETTABLE := [ dmac DMAC ] [ smac SMAC ] [ etype ETYPE ] SWAPPABLE := mac CONTROL := { reclassify | pipe | drop | shot | continue | pass } DESCRIPTION
The skbmod action is intended as a usability upgrade to the existing pedit action. Instead of having to manually edit 8-, 16-, or 32-bit chunks of an ethernet header, skbmod allows complete substitution of supported elements. OPTIONS
dmac DMAC Change the destination mac to the specified address. smac SMAC Change the source mac to the specified address. etype ETYPE Change the ethertype to the specified value. mac Used to swap mac addresses. The swap mac directive is performed after any outstanding D/SMAC changes. CONTROL The following keywords allow to control how the tree of qdisc, classes, filters and actions is further traversed after this action. reclassify Restart with the first filter in the current list. pipe Continue with the next action attached to the same filter. drop shot Drop the packet. continue Continue classification with the next filter in line. pass Finish classification process and return to calling qdisc for further packet processing. This is the default. EXAMPLES
To start, observe the following filter with a pedit action: tc filter add dev eth1 parent 1: protocol ip prio 10 u32 match ip protocol 1 0xff flowid 1:2 action pedit munge offset -14 u8 set 0x02 munge offset -13 u8 set 0x15 munge offset -12 u8 set 0x15 munge offset -11 u8 set 0x15 munge offset -10 u16 set 0x1515 pipe Using the skbmod action, this command can be simplified to: tc filter add dev eth1 parent 1: protocol ip prio 10 u32 match ip protocol 1 0xff flowid 1:2 action skbmod set dmac 02:15:15:15:15:15 pipe Complexity will increase if source mac and ethertype are also being edited as part of the action. If all three fields are to be changed with skbmod: tc filter add dev eth5 parent 1: protocol ip prio 10 u32 match ip protocol 1 0xff flowid 1:2 action skbmod set etype 0xBEEF set dmac 02:12:13:14:15:16 set smac 02:22:23:24:25:26 Finally, swap the destination and source mac addresses in the header: tc filter add dev eth3 parent 1: protocol ip prio 10 u32 match ip protocol 1 0xff flowid 1:2 action skbmod swap mac As mentioned above, the swap action will occur after any smac/dmac substitutions are executed, if they are present. SEE ALSO
tc(8), tc-u32(8), tc-pedit(8) iproute2 21 Sep 2016 skbmod action in tc(8)
All times are GMT -4. The time now is 10:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy