{"id":130,"date":"2010-06-07T08:29:03","date_gmt":"2010-06-07T08:29:03","guid":{"rendered":"http:\/\/blog.designed79.co.uk\/?p=130"},"modified":"2010-06-07T08:31:49","modified_gmt":"2010-06-07T08:31:49","slug":"how-to-spoof-your-mac-address-in-mac-os-x","status":"publish","type":"post","link":"https:\/\/blog.designed79.co.uk\/?p=130","title":{"rendered":"How to spoof your MAC address in Mac OS X"},"content":{"rendered":"<div id=\"_mcePaste\">A MAC address is a unique identifier assigned to your network card, and some networks implement MAC address filtering as a method of security. Spoofing a MAC address can be desired for multiple reasons, and it is very easy to spoof your MAC address in both Mac OS X 10.4 and 10.5. For the purpose of this article, we are going to assume you want to spoof your Mac\u2019s wireless MAC address.<\/div>\n<div>So without further ado, here\u2019s a 3 step process on how to do it:<\/div>\n<h3>Retrieving your current MAC address<\/h3>\n<div id=\"_mcePaste\">First, you\u2019re going to want your current wireless MAC address so you can set it back without rebooting. Launch the Terminal and type the following command:<\/div>\n<pre>ifconfig en1 | grep ether<\/pre>\n<div id=\"_mcePaste\">You\u2019ll know see something like:<\/div>\n<pre>ether 00:12:cb:c6:24:e2<\/pre>\n<div>And the values after \u2018ether\u2019 makeup your current MAC address. Write this down somewhere so you don\u2019t forget it. If you do, it\u2019s not the end of the world, you\u2019ll just have to reboot to reset it from a change.<\/div>\n<h3>Spoofing a MAC address<\/h3>\n<div id=\"_mcePaste\">To spoof your MAC address, you simply set that value returned from ifconfig to another hex value in the format of aa:bb:cc:dd:ee:ff<\/div>\n<div id=\"_mcePaste\">For this example, we will set our wireless MAC address to 00:e2:e3:e4:e5:e6 by issuing the following command:<\/div>\n<pre>sudo ifconfig en1 ether 00:e2:e3:e4:e5:e6<\/pre>\n<div id=\"_mcePaste\">The sudo command will require that you enter your root password to make the change.<\/div>\n<h3>Verifying the Spoofed MAC address worked<\/h3>\n<div id=\"_mcePaste\">If you want to check that the spoof worked, type the same command as earlier:<\/div>\n<pre>ifconfig en1 | grep ether<\/pre>\n<div id=\"_mcePaste\">Now you will see:<\/div>\n<pre>ether 00:e2:e3:e4:e5:e6<\/pre>\n<div id=\"_mcePaste\">Meaning your MAC address is now the value you set it to. If you want to further verify the spoof, simply login to your wireless router and look at the \u2018available devices\u2019 (or attached devices) list, and your spoofed MAC address will be part of that list.<\/div>\n<div id=\"_mcePaste\">If you want to set your MAC address back to its real value, simply issue the above ifconfig commands with the MAC address that you retrieved in step 1. You can also reboot your Mac.<\/div>\n<div><\/div>\n<h3>Airpot Spoofing<\/h3>\n<p>If you\u2019re still having problems with MAC address spoofing in Leopard or Snow Leopard, the above method still works but try disassociating with any wireless network BUT keep your wireless Airport on (as mentioned above) \u2013 an easy way to do this is to type the following in the command line:<\/p>\n<pre>airport -z<\/pre>\n<p>Note that you have to have the \u2018airport\u2019 command setup to work for users, you can do that by copy and pasting this command into the Mac Terminal:<\/p>\n<pre>sudo ln -s \/System\/Library\/PrivateFrameworks\/Apple80211.framework\/Versions\/Current\/Resources\/airport \/usr\/sbin\/airport<\/pre>\n<p>Once disassociated from the network you should be able to spoof your MAC address as usual<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A MAC address is a unique identifier assigned to your network card, and some networks implement MAC address filtering as a method [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-130","post","type-post","status-publish","format-standard","hentry","category-info-on-tech"],"_links":{"self":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=130"}],"version-history":[{"count":0,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/130\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.designed79.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}