如何追踪Mac位址 [英] How to trace mac address

查看:152
本文介绍了如何追踪Mac位址的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我是大一学生.我想使用vb.net开发一个软件应用程序,以追踪入侵者的mac地址并阻止它们.我仍处于计划阶段,但仍需要研究如何开发此应用程序.

请不要嘲笑我.我完全是新手.

解决方案

这有一些问题:主要与事物的工作方式有关.
首先,欺骗MAC地址并不困难(即假装为另一个).
其次,MAC地址通常不会携带经过它们遇到的第一台路由器-从那一刻起,它们就获得路由器的MAC地址,并且原始地址将保留在路由器地址转换表中.

因此,将其作为保护方法通常会适得其反-给人一种错误的安全感.

AFAIK没有直接获取当前远程MAC的方法-您将不得不查询路由器路由表,这不是一件容易的事,因为它会因型号和制造商而异.

因此,如果您只想在项目中演示某种安全系统的功能.您可以尝试关注.

创建VB.Net Web应用程序或创建基于套接字的客户端服务器应用程序.

服务器/Web应用程序将允许用户将文本文件(.txt)上传到服务器的位置.

现在,如果用户尝试上载.exe文件,则取消连接并显示无效文件类型的消息.然后将客户端的IP地址添加到数据库的黑名单"表中.

每次开始上载之前,请检查表是否在表中找到了当前IP地址,如果发现断开连接并显示消息您的IP地址已被列入黑名单,表示无效尝试".

然后尝试从另一台计算机上载.txt文件,并且该服务器在黑名单表中将没有该IP地址,因此它将允许连接.

并从以前的计算机上重试,将无法使用它.

这样,您可以演示检测入侵者并阻止进一步访问的基本思想.如果您不希望这样做,而是想进行现实生活中的应用. 我在休息室说的 [ 解决方案

There are a few problems with this: mostly related to how things work.
Firstly it is not difficult to spoof a MAC address (i.e. pretend to be a different one).
Secondly, MAC addresses generally do not carry past the first router they meet - from that point on they acquire the MAC address of the router, and the original is retained in the router address translation table.

So relying on this as a protection method is generally counter productive - it gives a false feeling of safety.

AFAIK there is no direct way to get the current remote MAC - you would have to query the Router routing table, and it''s not a simple job, as it will vary from model to model, and manufacturer to manufacturer.


So if you just want to demonstrate the functionality of some kind of security system with your project. You can try following.

Either create a VB.Net Web Application or create a Socket based Client-Server Application.

Where Server/Web Application will allow users to upload text files (.txt) to the server.

Now if a user tries to upload an .exe file, then cancel the connection and show the message of invalid file type. and then add the IP Address of the client to ''Black List'' table in database.

And every time before starting upload check the table if the current IP Address is found in the table, if found disconnect and show the message ''You IP Address has been black listed for invalid attempts''.

and then try to upload a .txt file from another computer, and the server will not have that IP Address in the black list table so it will allow the connection.

and try again from the previous computer and it will not allow it.

This way you can demonstrate the basic idea of detecting intruder and blocking further access. and if you do not want this and want to do a real life application.
as I said in the Lounge[^], you need to define what is Intruder means. after that it is easy to add the IP Address to Firewall.


这篇关于如何追踪Mac位址的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆