B
B
blinovalescha2016-04-17 21:20:46
Burglary protection
blinovalescha, 2016-04-17 21:20:46

How, using intercepter-ng, not to change the MAC address?

I used the interceptor, got the login and password of the person, decided to go to the account through the tor. everything was normal. then the provider called, saying that I had changed the poppy address, and that I needed to return it back. changed back. I don't understand why it changed. continued sniffing. got 1 more account, went to it through the tor. after an hour, the net was cut off, he called himself, they said that it was a scam, explaining again by changing the poppy address. They said that for the last time they forgive, next time we will terminate the contract.
what exactly changes the MAC address and how to avoid it?
PS
with accounts was not going to do anything wrong initially.

Answer the question

In order to leave comments, you need to log in

1 answer(s)
D
DaNHell, 2016-04-21
@DaNHell

chito? cheto
utter nonsense,
study the technical basics for the beginning . a) visually. When mimming, the mac address does not change, but arp spoofing occurs, as a result of which your device "pretends to be a router" by accepting a mac address that is located at the beginning of the arp table and is often static. If you even look at the router, you will see something like a client with XXX: XXX: MaC: ADRESS / ROUTER_Zyxel In simple terms, just stand in front of the router.
At the end of arp spoofing, the router again accepts its mac address, but your device is yours ..
So it's nonsense, and these are the basics .. it's a shame not to know .. how to conduct a mitm without at least this knowledge, or get cookies / or via insecure http data is the limit for you?)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question