hi, forgive the repost, i never saw the original come through my
inbox again:
--- got the new card, works decently with kismac and the ioxperts driver, although there are issues with reloading the ioxperts driver after exiting kismac.. i need to find time to investigate kextloading and kextunloading by hand as a matter of convenience.
that being said, the ioxperts driver does not appear to allow you to change the MAC address of any cards using it. Tiger appears to allow you to arbitrarily specify MAC addresses as long as the hardware driver allows it, so you can change en0, for example.
given the current lack of GT cards in the market, i would say that you can't expect to change the MAC address of any cards out there today at the application layer unless you are running stuff old enough for the sourceforge driver to work. (or have coded your own driver and don't want to share!)
perhaps some folks with spare time on their hands might like to work on porting the bsd wi or an drivers, or maybe even the sourceforge mac driver to tiger... although the possibilities of an open 802.11g driver (like mick's) are pretty slick. (unfortunately it appears that 802.11g cards don't come with external antenna jacks like their b counterparts, so perhaps a working b driver will be quite useful for a few more years)
so where does that leave us? at my current skill level, i would guess that the only way to send truly anonymous packets is to craft them at lower levels of the osi model, but i have not yet ventured into this territory. People talk about the tool ettercap for packet crafting. perhaps by gaining access to raw sockets as root you can craft whatever you like and inject at the link layer..
this is all speculation until i get the time to play around a bit more... i am particularly interested in finding out what raw sockets get me, and if i am visualizing the osi layers properly. if anyone here can correct me or shed additional light, please reply to the list or email me privately!
g
PGP Fingerprint: 55B3 2CD2 12F8 4B1D 5EC5 E1B2 BD74 B642 879B 0F17
On Jul 29, 2005, at 7:29 AM, Java Nut wrote:
Did you or anyone else successfully managed to spoof a MAC address with a Prism2 card or any USB device?
I was able to do a PRISM2 card in OS X 10.2.8 with the source forge wireless driver and an older version of KisMac by choosing to install the patch, and then using the WirelessMac application. This method does not work in Panther, and I don't know what to do in Tiger. I am interested in how to do this in more modern versions of OS X.
Bob, can you share the current state of your Guide? Thanks.
Gerry, did you have any luck with your new PRISM2 card you said you had on the way July 19?
Thanks.