spoofmac is kinda tricky. to get it to work, you have to use it
without having joined a network since your last restart. One way to
do this, which is annoying, but protects you from some particularly
crafty wireless attacks, is to remove all APs from your "preferred
networks" list (under airport in sytem prefs) so that you have to
manually join every access point. Then, to spoof, restart, run
spoofmac, then try to associate to the ap.
Not using preferred networks is kinda annoying, but it does protect you from the "karma" attack where the attacker listens to your wireless card as it searches for its preferred networks and then creates an AP with the name of one of your preferred networks for you to join.
On Jun 19, 2006, at 10:31 AM, el_criuz wrote:
May be possible but I don't think so.
I already tried SpoofMac but the app doesnt work for me (although I use it on a G4 1,67 Powerbook)
When I try to spoof my airport card the result is just 00:00:00:00:00 and not the adress I wanted to spoof.
I need to restart my computer in order to use any network card then.
On 19.06.2006, at 18:19, Stefan Jeglinski wrote:
I tried normal, hex and ascii but none of them worked.
The hex value that kismac tells me to be the key consists just of numbers.
I collected the weak packets over quite a long time (5 days) is it possible that the key got screwed up by something?
Is is possible that something else is preventing you from joining the network? MAC filtering for example?