{{Header}} {{#seo: |description=MAC Address Spoofing and Tracking Threats |image=MACaddress2131.jpg }} [[File:MACaddress2131.jpg|200px|thumb]]
wlan0
). Replace wlan0
with the appropriate device, such as an ethernet device (eth0
).
}}
{{CodeSelect|code=
su
}}
{{CodeSelect|code=
ifconfig wlan0 down
}}
{{CodeSelect|code=
macchanger -a wlan0
}}
{{CodeSelect|code=
ifconfig wlan0 up
}}
If the steps above do not work, the following method might work without macchanger. Replace wlan0
with the correct device name.
{{CodeSelect|code=
su
}}
{{CodeSelect|code=
ifconfig wlan0 down
}}
{{CodeSelect|code=
ifconfig wlan0 hw ether 00:AA:BB:CC:DD:EE
}}
{{CodeSelect|code=
ifconfig wlan0 up
}}
Alternatively, use iproute2 commands to change the MAC address.
{{CodeSelect|code=
ip link set down wlan0
}}
{{CodeSelect|code=
ip link set wlan0 address 00:AA:BB:CC:DD:EE
}}
{{CodeSelect|code=
ip link set up wlan0
}}
'''4.''' Complete the MAC address change.
Below iface eth0 inet dhcp
, add:
{{CodeSelect|code=
hwaddress ether 00:00....
}}
'''5.''' ''Optional:'' Automatically randomize the MAC address on boot.
To enable this, add:
{{CodeSelect|code=
pre-up macchanger -e eth0
}}
'''6.''' Modify network interface settings.
To prevent new network interfaces from being automatically activated, comment out the following line:
{{CodeSelect|code=
auto eth0
}}
Then, configure manual activation with:
{{CodeSelect|code=
sudo ifup eth0
}}
}}
= References =
{{reflist|close=1}}
= License =
{{License_Amnesia|{{FULLPAGENAME}}}}
{{Footer}}
[[Category:Documentation]]