Mac Address Spoofing?? - myTouch 3G, Magic General

Is it possible to mac spoof the wifi of an android phone?? is there like an application or a method???

Vladovski said:
Is it possible to mac spoof the wifi of an android phone?? is there like an application or a method???
Click to expand...
Click to collapse
Probably not because the standard *nix command for doing this is ifconfig.
ifconfig has different behavior on Android than on other distros.
Apparently netcfg must be used to list adapters on Android. I doubt netcfg has the ability to assign a different MAC address.

Related

change wifi mac address?

Hello.
Is there a way to change the mac address of the wifi network interface of the titan?
I would like to be able to do that so I can use my titan's browser to authenticate to web portals, and then use my wifi voip phone (with the same mac address) to make calls.
Do you mean MAC address or IP address?
The MAC is a hardcoded address of the form xx-xx-xx-xx-xx-xx, using hex. MAC addresses cannot be changed as each interface has a unique number. The MAC address can be spoofed to match another interface, this is usually an available feature on routers to spoof to the ISP that you are not sharing a connection on your home network.
The IP address can be changed and is of the form xxx.xxx.xxx.xxx using only numbers. The WIFI interface on the titan will be set up for DHCP, ie it requests an address from the wireless source it is connected to. This can be changed to give the IP address required if DHCP is not availabe on the network selected.
I am talking about changing/spoofing the mac address if the network wifi card.
There are a bunch of utilities out there that are able to do so on the fly for windows XP, maybe someone has one for windows mobile?
Or a registry key location that does that?
stanelie said:
I am talking about changing/spoofing the mac address if the network wifi card.
There are a bunch of utilities out there that are able to do so on the fly for windows XP, maybe someone has one for windows mobile?
Or a registry key location that does that?
Click to expand...
Click to collapse
SO,
Did anybody ever figure out how to do this?
I need to fix my MAC address and would like help.
Do a reflash of the rom
drewcam888 said:
Do a reflash of the rom
Click to expand...
Click to collapse
Hi Drew,
I appreciate your reply, however, could you be a little more specific? reflash to rom meaning the Verizon Stock rom?

IP

How could I get the IP address to my G1? thats the Ip my phone uses for internet not the ip when its connect via wifi
You have a couple options. Using Terminal Emulator you can use the netstat command or you can use the easy way and go to www.ip-address.com. What do you need your uip address for anyway? You can't remote in through edge or 3g like you can wifi though telnetd.
thanks...................
aad4321 said:
now i dont know the name of the app which was released last week in the market, but it uses dynamic dns and updates your G1's IP address automaticly to a domain name.
Click to expand...
Click to collapse
You're referring to DynDNS and you can also find it in some routers. Unfortunatly, I believe there is a service charge for it. I use no-ip instead because it works just as well. But as far as I know DynDNS is the only app that offers this. But again... why do you need it??? I noticed that when I go to whatismyipaddress.com and when I do Netstat in Terminal Emulator I get two different ip addresses. I don't know what's up with that but I'm thinking that the netstat is the ACTUAL ip address and the ip address shown on the web site is a proxy. I would imagine that T-Mobile would not be stupid enough to leave their subscribers phones open to everyone else. It's very simple to get someone elses ip address if you're a host of a web server since all ip addresses are logged and without security (such as a proxy) it could leave all users vunerable. So my conclusion... if you had your real ip address... what do you plan on doing with it? You can only access your G1 through WiFi as far as I know. But correct me if I'm wrong.

Changing mac adress of Blackstone?

Hi
Could you please tell me how i can change the mac adress of my HTC Touch HD?
You can't...
BenBen_ said:
Hi
Could you please tell me how i can change the mac adress of my HTC Touch HD?
Click to expand...
Click to collapse
As far as I'm aware you cannot change a physical MAC address as it is hardwired into the network interface card, therefore, the only way you could change it is by swapping out the main board.
Why would you want to change it?
You can't change it it's embedded into the wireless hardware, why would you want to?
I found this program Macshift for XP http://devices.natetrue.com/macshift/.
Maybe someone can change it to work on wm.
but the same question exists...why do you want to change your MAC address?
the Mac address is a combination of the manufacturers code and the device serial number. The result being that no two devices anywhere in the world have the same Mac address....should this happen in real life..all sorts of problems can occur with web based communications.
this been asked since the first htc device with wifi was released search
networking forum for info
as far as i know nobody ever managed to do it
also it would be a problem as 2 devices with the same mac address (mac addresses being the only truly unique identifier for 2 network devices could mess up network traffic pretty much)
the other person whos ½ packets you may intercept and his yours giving you both network instablity may feel strongly against you chanting your mac address to the same as his
I'd still like to know why BenBen_ wants to change the MAC address?
Maybe he cracked the wep key of an access point which uses MAC filtering and then analyzed the packets to find out which MAC has access to the AP .. And now he wants to use that MAC.. ( I am just assuming )

IPv6 connectivity issues

have a Galaxy S4 on verizon, and have a dual-stack IPv6-enabled LAN with Comcast-provided prefix delegation from the router. Every other device - Windows/Mac/Linux computers, iphones/ipads, Lumia 2520 windows tablet - has no problem pulling addresses & connecting to each other either using the link-locals or the global addresses. Except for Android. Using the app "IPv6 and more", it shows me pulling a proper IPv6 global address, but using the ping/trace tools in this app I am unable to connect to any other host on the LAN. I CAN connect to global addresses outside the LAN. The app (which looks pretty substandard IMHO) apparently runs 2 tests, "via API" and "commandline". The API shows any other LAN address as "NOT reachable". Global addresses on the internet show "reachable" via API, but still not from commandline. Additionally, the ES file explorer has the same problem connecting to LAN hosts; it can connect fine to an IPv6 FTP server i've setup elsewhere, but has no access internally.
Any idea what's going on? Is IPv6 LAN access broken in Android?
train_wreck said:
have a Galaxy S4 on verizon, and have a dual-stack IPv6-enabled LAN with Comcast-provided prefix delegation from the router. Every other device - Windows/Mac/Linux computers, iphones/ipads, Lumia 2520 windows tablet - has no problem pulling addresses & connecting to each other either using the link-locals or the global addresses. Except for Android. Using the app "IPv6 and more", it shows me pulling a proper IPv6 global address, but using the ping/trace tools in this app I am unable to connect to any other host on the LAN. I CAN connect to global addresses outside the LAN. The app (which looks pretty substandard IMHO) apparently runs 2 tests, "via API" and "commandline". The API shows any other LAN address as "NOT reachable". Global addresses on the internet show "reachable" via API, but still not from commandline. Additionally, the ES file explorer has the same problem connecting to LAN hosts; it can connect fine to an IPv6 FTP server i've setup elsewhere, but has no access internally.
Any idea what's going on? Is IPv6 LAN access broken in Android?
Click to expand...
Click to collapse
Eh, can you ping from the command line to ipv6 addresses on the wan?
And what android version.
Also, the app is probably buggy.
pinging from terminal
Lgrootnoob said:
Eh, can you ping from the command line to ipv6 addresses on the wan?
And what android version.
Also, the app is probably buggy.
Click to expand...
Click to collapse
do you mean "command line" as in a terminal emulator app? if so, ping6 isn't there and ping doesn't appear to support IPv6. (at least, no "-6" option)
and it is Android 4.3, non rooted.
train_wreck said:
do you mean "command line" as in a terminal emulator app? if so, ping6 isn't there and ping doesn't appear to support IPv6. (at least, no "-6" option)
and it is Android 4.3, non rooted.
Click to expand...
Click to collapse
Well, have fun with that. You could temporary root just to put the busybox binary on it.
Then remove su and its dependencies with the supersu unroot button.
Then busybox will have ping6.

MAC Address Spoofing

Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
*** This requires root ***
I have it working in Marshmallow 6.0.1 (not tried it in Nougat)
Only attempt this if you understand MAC Addresses and be sure to note down your original/official MAC Address. Open /persist/wlan_mac.bin and take a copy of the contents before attempting the below.
Some background reading if you're not familiar with MAC Addresses.
Code:
ifconfig wlan0
will tell you all you need to know about the current state of your wireless adapter
The first command generates a MAC Address. I've hardcoded the first 6 characters of mine and randomly generate the remaining 6. It should generate a perfectly valid address but please post if it doesn't (or you have a better bash line).
The second sed command is to replace the MAC Address in the persisted wlan file. It's this command that needs to run as root.
You should be able to run these in something like Termux (make sure you're running as root by running "su" first). I actually run them using Tasker as "Code/Run Shell" commands.
Finally you need to enable then disable Airplane Mode for the change to take affect.
Here are the commands:
Code:
MAC=C0EEFB$(od -txC -An -N3 /dev/random| tr -d ' ')
Code:
sed -i "/Intf0MacAddress=/c\Intf0MacAddress=${MAC}" /persist/wlan_mac.bin
Code:
settings put global airplane_mode_on 1; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state true
Code:
settings put global airplane_mode_on 0; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state false
Code:
ifconfig wlan0 | grep HWaddr
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
BTW, thanks for the share!
bealer said:
Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
Click to expand...
Click to collapse
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
I dont think that it will work since our devices are F2FS i saw this on reddit the other day.
using a custom mac address
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Thanks in advance.
m0d hipp¥ said:
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
Click to expand...
Click to collapse
Yeah definitely things to improve,automating storing the original being one of them. I'll maybe follow up with that.
I didn't want to mask the main two commands too much with others around them. There are a few (older) ways to do this but this was the only way I could get it to work. And it's not a complete app/solution, more teaching a man to fish sort of thing.
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
You can although
a) OP3T isn't listed as a supported device, I didn't try it
b) You can't automate it with that app very easily. Mine changes via Tasker state/events every day so I don't need to bother doing it myself.
gxyf106 said:
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Click to expand...
Click to collapse
Easiest way is just to change the first command and hardcode the MAC you want, ie
Code:
MAC=C0EEFB998877
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
gxyf106 said:
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
Click to expand...
Click to collapse
Ah oops, that's an error in me typing it out. The 2nd command should contain:
Code:
${MAC}
The brackets were causing it to try and evaluate MAC as a command (rather than a variable). I'll update the OP.
I can confirm this works. many thanks!!
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Michalko5896 said:
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Click to expand...
Click to collapse
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
bealer said:
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
Click to expand...
Click to collapse
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Michalko5896 said:
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Click to expand...
Click to collapse
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
bealer said:
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
Click to expand...
Click to collapse
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
It stops wifi services tracking my phone. For example I use the wifi on the London Underground. Every time I connect to their wifi they'd know exactly where, when, how long, possibly my DNS requests just based on my MAC. It's all information that can be used for profiling or sold on (if that was part of the terms). They still may not known who I am exactly, but I'd rather they weren't able to identify/target me if it meant simply randomising my MAC. As mentioned Android already does this when scanning for networks.
Device Id isn't given, unless you mean hostname (which can be randomised too). If you're using HTTPS based websites then all browser traffic is encrypted via SSL. If you're not, then yeah it's possible to packet sniff your traffic (which is illegal), see what you're browsing, what your browser is, even part (but not all I believe) of your MAC etc...
Try Pry-Fi
Chainfire already has Pry-Fi for that. It has worked flawlessly for me.
first of all thank you for the commands but somehow this does not work with my Oneplus 3 (without T) on Sultans CM13. The address does not change after entering the commands, the commands do not show any error message.
Any advice?
Furthermore Pry-Fi seems to be able to change the MAC but it crashes sometimes and it seems to loose my saved WiFis. Furthermore i am not able to connect to my home AP after changing the MAC with Pry Fi. :-/
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
Many public, free hotspots that require accepting terms on "walled garden" page today are tracking MAC address, DHCP-assigned IP address, and DHCP lease and active session time stamps. Example hotspots include Starbucks, hotels, etc. These hotspot network operator have logs to trace IPs back to MACs at a specific point in time until the logs are disposed.

Categories

Resources