[kismac] Re: Guide to MAC customization on the Mac

  • From: Gerry <curioushacker@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Fri, 29 Jul 2005 19:43:13 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

got the new card, works decently with kismac and the ioxperts driver,  
although there are issues with reloading the ioxperts driver after  
exiting kismac.. i need to find time to investigate kextloading and  
kextunloading by hand as a matter of convenience.

that being said, the ioxperts driver does not appear to allow you to  
change the MAC address of any cards using it.  Tiger appears to allow  
you to arbitrarily specify MAC addresses as long as the hardware  
driver allows it, so you can change en0, for example.

given the current lack of GT cards in the market, i would say that  
you can't expect to change the MAC address of any cards out there  
today at the application layer unless you are running stuff old  
enough for the sourceforge driver to work. (or have coded your own  
driver and don't want to share!)

perhaps some folks with spare time on their hands might like to work  
on porting the bsd wi or an drivers, or maybe even the sourceforge  
mac driver to tiger... although the possibilities of an open 802.11g  
driver (like mick's) are pretty slick. (unfortunately it appears that  
802.11g cards don't come with external antenna jacks like their b  
counterparts, so perhaps a working b driver will be quite useful for  
a few more years)

so where does that leave us?  at my current skill level, i would  
guess that the only way to send truly anonymous packets is to craft  
them at lower levels of the osi model, but i have not yet ventured  
into this territory. People talk about the tool ettercap for packet  
crafting.  perhaps by gaining access to raw sockets as root you can  
craft whatever you like and inject at the link layer..

this is all speculation until i get the time to play around a bit  
more... i am particularly interested in finding out what raw sockets  
get me, and if i am visualizing the osi layers properly. if anyone  
here can correct me or shed additional light, please reply to the  
list or email me privately!


g


- --
Gerry Koh | 415.608.9777

PGP Fingerprint: 55B3 2CD2 12F8 4B1D 5EC5 E1B2 BD74 B642 879B 0F17

"Far better is it to dare mighty things, to win glorius triumphs,  
even though checkered by failure... than to rank with those poor  
spirits who neither enjoy nor suffer much, because they live in a  
gray twilight that knows not victory nor defeat."

- - Theodore Roosevelt

On Jul 29, 2005, at 7:29 AM, Java Nut wrote:

>> Did you or anyone else successfully managed to spoof a MAC address  
>> with a Prism2 card or any USB device?
>>
>
> I was able to do a PRISM2 card in OS X 10.2.8 with the source forge  
> wireless driver and an older version of KisMac by choosing to  
> install the patch, and then using the WirelessMac application. This  
> method does not work in Panther, and I don't know what to do in  
> Tiger. I am interested in how to do this in more modern versions of  
> OS X.
>
> Bob, can you share the current state of your Guide? Thanks.
>
> Gerry, did you have any luck with your new PRISM2 card you said you  
> had on the way July 19?
>
> Thanks.
>
>
>
>


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.1 (Build 2185)

iQA/AwUBQurpRr10tkKHmw8XEQKFmQCfdu43LEx5nPQp2g3mSl5PSQaJm/4AnRwZ
VGpVIl+duB6JOkw3u7cTwOKZ
=JVa3
-----END PGP SIGNATURE-----

Other related posts: