O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Evading MAC filtering with MAC spoofing

During your explorations, one technique that may be deployed against you an effort to stop you is a technique known as MAC filtering. Simply put, MAC filtering is a countermeasure that involves either whitelisting the MAC addresses of devices approved to be on your network or blacklisting devices that you don't want on your network. While this technique is incredibly rare and often encountered on none but the smallest of networks it is still a countermeasure that frequently pops up as a recommended security mechanism. Here, we will explore how to evade MAC filtering and gain access to a network anyway.

In most consumer and commercial grade access points, it is not difficult to find an option for MAC ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required