如何欺骗MacBookPro和Leopard 10.5.6随附的有线以太网接口的以太网MAC地址? [英] How to spoof an ethernet MAC address of the wired ethernet interface coming with MacBookPro and Leopard 10.5.6?

查看:101
本文介绍了如何欺骗MacBookPro和Leopard 10.5.6随附的有线以太网接口的以太网MAC地址?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

使用OSX 10.5。

With OSX 10.5. it's no longer possible to spoof MAC addresses of your wired interface (e.g. en0) with "ifconfig en0 laddr/ether XX:YY:...."

a /为什么用 ifconfig en0 laddr / ether XX:YY:....来欺骗您有线接口的MAC地址(例如en0)。是这样吗?

a/ why is that?

b / VMware vmnet-xxx恶魔?

b/ how is it notwithstanding done by e.g. VMware "vmnet-xxx" deamons?

c / c /有人知道Apple Developer软件包是否包含有关mach内核设备接口的详细且有用的信息?例如设备驱动程序示例代码等?

c/ does anyone know wether the Apple Developer package contains detailed and useful information regarding the mach kernel device interfaces? e.g. device driver example code, and the like?

非常感谢

Grusz

推荐答案

A:出于安全原因,这可能是工作场所中的更改(这仅仅是纯粹的推测,可能不正确),如下所示:这似乎是一个驾驶员问题(根据经验,这在Tiger中是可能的)。在无线接口en1上仍然可以这样做。即使物理接口不支持它,也可以将设备置于监视模式,并使MAC地址匹配在IP链中更高的位置进行。我们将不得不等待,看看苹果公司对此做了什么。

A: This may be a change for security reasons in the work place (this is just pure speculation, and may or may not be true), as it seems to be a driver issue (this was possible in Tiger, I know from experience). It is still possible to this on the wireless interface en1. Even if the physical interface did not support it, the device could be put into "monitor" mode and have the MAC address matching take place higher up in the IP chain. We shall have to wait and see what Apple does about this.

B:这些守护程序将有线网络置于监视模式,基本上,这是告诉网卡您希望将发送给您的所有内容都作为由OS处理,因此它会关闭对网卡(如果支持)进行的过滤,该过滤通常会丢弃原本不属于自己的东西(其MAC地址),然后使用软件在软件中完成所有操作操作系统提供的标准过滤钩子,它可以侦听任何传入的数据包,并从网上获取那些发往VMWare设置的虚假MAC地址的数据包。

B: Those daemons put your wired network into "monitor" mode, basically what this does is tell your network card that you want everything that is being sent to you to be handled by the OS, so it turns off filtering that is done on the network card (if it supports it) which would normally discard things that were not destined for itself (its MAC address), and then it does it all in software, using the standard filtering hooks provided by the OS it can listen to any incoming packets and grab those off the wire that are destined to the fake MAC address that VMWare has set.

说明用外行话来说:假设您正坐在机场,正在等待可以登机的通知,您会被动地听,但会忽略所有不包含航班号的信息。现在有人来了,请您也听他们的航班号,现在您必须积极地听,因为您不能只过滤一个航班号。

Explained in laymen terms: Lets say you are sitting at an airport and are waiting for an announcement that you can board your plane, you passively listen but ignore everything that does not contain your flight number. Now someone else comes along and asks you to also listen for their flight number, now you have to actively listen since you can't just filter on one flight number.

C :是的,除其他外,您将找到代码示例和参考手册。它们也都可以在线获得,如果它们是由Apple开发的,那么您也可以在线找到大多数设备驱动程序的代码。该文档相当不错,但是我注意到在某些方面一直缺少文档,这使我很难弄清完成某项工作所需要做的事情。 Developer.apple.com的概念网络设备驱动程序 Darwin 的源代码也可以在 http://www.opensource.apple.com/darwinsource/ ,您可以在其中找到大多数Mac OS X设备驱动程序允许Apple以开放源代码的形式发布它们(不包括Yukon2驱动程序)

C: Yes, amongst other things you will find code examples and reference manuals. They are also all available online and you may find the code for most device drivers online as well if they were developed by Apple. The documentation is fairly good however I have noticed that in certain areas it has been lacking and made it fairly difficult for me to figure out what I needed to do to get something done. Developer.apple.com's Conceptual Network Device Driver. The source code for Darwin is also available at http://www.opensource.apple.com/darwinsource/, there you can find most device drivers for Mac OS X as long as Apple is allowed to release them as Open Source (Yukon2 driver is not included)

这篇关于如何欺骗MacBookPro和Leopard 10.5.6随附的有线以太网接口的以太网MAC地址?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆