Every device that’s connected to a network possesses a worldwide, unique, and physical iden­ti­fic­a­tion number: the Media Access Control address, or MAC for short. This burned-in address (BIA) is virtually etched to the hardware by the man­u­fac­turer. Users are not able to change or rewrite the MAC address. But it is possible to mask it on the software side. This masking is what’s referred to as MAC spoofing.

  • MAC addresses: distinct hardware addresses identify network interface con­trol­lers (NIC) such as LAN cards or WLAN adapters, and are used to identify devices in local networks. Every MAC address includes 48 bits, or 6 bytes, and is arranged in the following pattern: 00:81:41:fe:ad:7e. The first 24 bits are the man­u­fac­turer code assigned by the Institute of Elec­tric­al and Elec­tron­ics Engineers (IEEE), and the following 24 bits are the device number defined by the man­u­fac­turer.
  • Spoofing: in the network ter­min­o­logy, spoofing refers to the various methods which can be used to ma­nip­u­late the fun­da­ment­al address system in computer networks. Hackers use this method of attack to conceal their own identity and imitate another. Other than MAC addresses, other popular targets for spoofing attacks are the internet protocol (IP), domain name system (DNS), and address res­ol­u­tion via Address Res­ol­u­tion Protocol (ARP). Basically, spoofing is a res­ol­u­tion strategy for troubleshoot­ing – but in most cases, it’s used for the in­filt­ra­tion of foreign systems and illegal network activ­it­ies instead.

Reasons to mask your own MAC address

The­or­et­ic­ally, every network device in the world is iden­ti­fied by a MAC address. But not every user wants this trans­par­ency on the internet. One reason to mask your MAC address is for the pro­tec­tion of privacy – for example, in public WLAN networks. This le­git­im­ate use of MAC spoofing is in op­pos­i­tion to the illegal activ­it­ies, where users change MAC addresses to cir­cum­vent access re­stric­tions and security measures or imitate the identity of another network device.

An­onymisa­tion

Some users prefer to hide the identity of their device behind a false MAC address in order to protect their privacy. One reason is because MAC addresses sent over public LAN or WLAN networks are usually un­en­cryp­ted. Every user on the network can then track which devices are re­gistered in the network, read out the re­spect­ive hardware addresses, and use them for illegal activ­it­ies. Hackers use this op­por­tun­ity to surf an­onym­ously. Generally, the MAC address of another network device is imitated to take advantage of its access rights and shift the blame for illegal activ­it­ies to another user.

Identity theft

To protect IT systems from internal and external dangers, ad­min­is­trat­ors sometimes implement security measures that restrict access to the LAN to au­thor­ised devices. At the network level, linking elements such as Ethernet switches via port security provide the op­por­tun­ity to filter network data traffic on the OSI layer 2. Switches can separate big networks into smaller segments. Once a con­nec­tion has been es­tab­lished from one segment to another, the in­ter­me­di­ate coupling element checks the MAC address of the sender device and matches it with an ad­min­is­trat­or-created whitelist. If it’s an unknown address, the switch blocks the re­spect­ive port and stops the com­mu­nic­a­tion attempt. WLAN networks can also restrict access to known network devices using MAC filters. But MAC spoofing enables hackers to get around security measures like this. In reality, MAC whitel­ists offer very little pro­tec­tion. Masking the hardware addresses of in­di­vidu­al computers behind au­thor­ised network users requires nothing more than a manual con­fig­ur­a­tion of the network settings on the re­spect­ive operating system. Linux, Mac OS X and Microsoft Windows all allows users to establish LAN con­nec­tions without requiring a MAC address. By contrast, hardware addresses from WLAN cards using Windows cannot easily be ma­nip­u­lated.

Licensing terms

Sometimes software ap­plic­a­tions are re­stric­ted to a certain number of devices. This is only possible on systems whose MAC addresses have been given in the license agreement. If one of the devices has to be replaced due to a hardware issue, then the software can’t be used with the new device. Some users get around this re­stric­tion by rewriting the new hardware address in the software so that it matches the one listed in the license, but this approach isn’t re­com­men­ded.

A provider could classify this type of MAC spoofing as a fraud­u­lent use of services and take legal action. Instead, licensees should contact their provider and ask about the pos­sib­il­ity of a hardware exchange. If MAC spoofing is used to imitate an au­thor­ised device to gain access to paid software ap­plic­a­tions or online services, it’s always con­sidered a legal offense.

How does MAC spoofing work on Windows?

To mask a MAC address, you just need to access the network settings on the Windows control panel and define a new iden­ti­fic­a­tion number in the software. The operating system will now send data packets with the user-defined MAC address in the local network. The following step-by-step tutorial explains MAC spoofing using Windows 7. The con­fig­ur­a­tion on other Windows versions follows the same general pattern, but the details may vary.

De­term­in­ing the current MAC address

Before you customise the MAC address in the software of your network card, you should determine the address assigned by the man­u­fac­turer and keep it on hand. To do this, you take the following steps:

Open the Windows menu by clicking the start button and type the letter sequence cmd into the search bar in the lower right corner. As a search result, the operating system suggests the Windows console cmd.exe.

Start the programme by double clicking the programme name or confirm the selection by pressing the enter key. This will open a black console window: the Windows command prompt.

Dir­ect­ives are entered into the Windows console in the form of commands from the keyboard. To release the MAC address from your network card using the console, type the command getmac in the line marked by a blinking un­der­score in the command prompt and confirm by pressing the enter key.

Write down the character sequence that’s displayed in the console window under “physical address”. This is the MAC address assigned by the man­u­fac­turer. You will need this to reset the con­fig­ur­a­tion to the default setting.

Change the MAC address in the network settings

Al­ter­a­tion of the MAC address in Windows happens in the network settings. To get there, access the Windows menu by clicking the start button. In the right-hand column, locate the “control panel”.

In the Windows control panel you have the option to customise all of the settings on your computer. The system network settings are found in the section labelled “Network and Internet”.

This opens a submenu with three options. Click on “Network and Sharing Center” to display the basic in­form­a­tion about your network.

The window shows a general overview of all of the network con­nec­tions that are linked to your computer. Click on “Change adapter settings” in the list on the left-hand side to access the settings on the network card.

In the overview, select the network card that you would like to re­con­fig­ure. In the example system here, the LAN con­nec­tion “Local Area Con­nec­tion 2” is es­tab­lished via the “Network card Intel(R) PRO/1000 MT Desktop Adapter”. Double click on the desired con­nec­tion to open a window with status in­form­a­tion.

Click on the “Prop­er­ties” button. The pro­tect­ive shield icon shows that you can only change adapted settings with ad­min­is­trat­ive access. If you are working in another user account, the system asks for an ad­min­is­trat­or password via the user account control.

If you have the necessary access rights, a new window will open listing the network card as well as clients, protocols, and drivers of the con­nec­tion. Click on the “Configure” button to open the settings menu for the network card.

This opens a window with five tabs. Click on “Advanced” and under prop­er­ties select the “Locally Ad­min­istered Address”.

The Locally Ad­min­istered Address (LAA) is a MAC address assigned to the software, which is linked to a network card and so replaces the address given by the man­u­fac­turer – including the Uni­ver­sally Ad­min­istered Address (UAA).

To define an LAA, switch the selection on the right from the standard “Not Present” option by clicking on “Value” and then entering any 12-character string of hexa­decim­al digits.

As soon as you confirm your settings by clicking OK, your network card dis­con­nects from the LAN and builds a new con­nec­tion using the custom LAA.

Change the MAC address in the registry

As an al­tern­at­ive to the network settings, Windows users have the option to change the MAC address using the registry. This option is only re­com­men­ded for ex­per­i­enced users, though.

To access the Windows registry, enter the command regedit into the search list and start the re­gis­tra­tion editor. Then, navigate to the following entry:

HKEY_LOCAL_MACHINE\SYSTEM\Cur­rent­Con­trol­Set\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}

Here you’ll find a row of con­sec­ut­ively numbered sub­folders (0000, 0001, 0002, etc.). Find the folder whose Driver­Desc entry contains the name of your network card. If the Net­work­Ad­dress entry is found in this folder, edit it by right-clicking on the entry and selecting the “Change” function from the context menu. Enter the desired MAC address here.

If no cor­res­pond­ing entry is available, you can create one with right-click > “New” > “String”.

MAC spoofing software

Instead of changing the MAC address manually using the network settings or the Windows registry, users can employ free software solutions like Tech­ni­ti­um MAC Address Changer or Windows 7 MAC Address Changer.

  • The Tech­ni­ti­um MAC Address Changer allows users to easily manage network cards through a clear user interface. The Freeware tool offers an overview of all con­nec­tions, displays the current MAC addresses of the hardware in use, and includes a function that allows you to change it with the push of a button. The original iden­ti­fi­er is stored in the tool as well as the altered MAC address. An in­teg­rated generator creates randomly generated sug­ges­tions on request. Tech­ni­ti­um MAC Address Changer is available for Windows 7, 8, and 10 and runs 32-bit and 64-bit versions. As soon as user settings are made in the software interface, the programme writes the cor­res­pond­ing values in the Windows registry. Manual in­ter­ven­tion is elim­in­ated, and so the risk of jeop­ard­ising the stability of the system with incorrect entries is too. All settings can be returned to their initial state by pressing the “Restore Original” button.
  • The Win7 MAC Address Changer runs dif­fer­ently on Windows Vista and Windows 8, as the name would suggest. The Freeware software offers a similar range of functions as the Tech­ni­ti­um MAC Address Changer. The MAC spoofing follows four steps: Selection of the network card, selection of the operating system, selection of the desired MAC address, and con­firm­a­tion of the settings using the “Change” button. The Win7 MAC Address Changer also supports users with a “Randomise” button. The “Reset to Default” button restores the default settings.

Just like with manual MAC spoofing, use of these pro­grammes doesn’t change the physical address. The operating system simply pretends that the user-defined Locally Ad­min­istered Address is the Uni­ver­sally Ad­min­istered Address.

Go to Main Menu