[kismac] Re: patch to allow MAC spoofing on macs

  • From: Lee Lindquist <inaudiblenoise@xxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Sun, 3 Oct 2004 23:26:48 -0500

Hmmmm . . .

I've been very curious about this ability for some time. Since the WirelessMAC tool seems to be broken under 10.3, I have been unable to change MAC addresses on anything but my en0 interface.

I have recompiled my kernel a few times in the past, but have since traded up machines and have not loaded the required tools to do it again. To save me (and a few others, I would assume) the trouble of compiling, could you post a compiled kernel somewhere for testing?

Its not that I can't do this myself . . . it would just sure save me a lot of time.

Thanks for the effort, and for the nice patch!


On Oct 3, 2004, at 9:43 PM, Johnny Cache wrote:

Hey guys, this isnt inherently tied to kismac but i know most of you
are interested in it.

I have successfully patched my xnu kernel to allow me to change the mac
address of most ethernet devices. This works regardless of
whether the device supports the ioctl to do it. It accomplishes
this by rewriting it on the wire as it goes out, and doing the inverse
when it comes in. So far it works pretty well :) No crashes and no dropped

The docs included are pretty weak, but this is just a beta. If
you cant recompile your own kernel w/o hand holding youll hafta
wait till later to try this out.

Oh, for those of you thinking ahead: The patch also forges the payload
in arp packets and there is a hacked ISC dhcp client included that
is aware of the shadowmac interface as well.

The tarball is here:

Let me know if you like it. I'd really like to get a
sexy konfabulator widget to let me interface with this,
so if any of you are artists let me know if you're interested.

Happy Hacking -jc

P.S. this code doesnt seem to work well with airport but im not sure why.
it functions with my smc card. Wireless hasnt been as thoroughly tested
as wired. YMMV. I intend to focus on this later this week.

Other related posts: