It's crucial to perceive MAC addresses akin to fingerprints at a crime scene. If your MAC address is logged while on a network and feds seize your PC, they could cross-reference their logs to trace the MAC address back to your device, potentially implicating you in any illicit activities.
To enhance anonymity, it's imperative to change all values before connecting to any network and upon each shutdown of your PC. This practice should be implemented on both your host machine and any virtual machines connecting to the network.
A) Example of the WORST hardware spoofing (ONLY spoofing the MAC Address):
MAC Address | Computer Name | Hostname
71-4B-AA-E1-A5-2F | TheVikings-PC | TheVikings.localhost
82-0C-56-15-B9-94 | TheVikings-PC | TheVikings.localhost
52-76-B2-00-CC-A5 | TheVikings-PC | TheVikings.localhost
Have you observed it? Merely spoofing your MAC address doesn't effectively conceal your identity. TheVikings appears to be the individual engaging in malicious activities on the network; however, their MAC address varies with each occurrence.
Very well, we shall now provide TheVikings with another opportunity to rectify this issue.
B) Example of the BEST hardware spoofing (Changing MAC address and PC name):
MAC Address | Computer Name | Hostname
45-1D-3F-8B-45-3F | RedSkins-PC | RedSkins.localhost
A7-66-D6-77-E1-2B | Slipk-PC | Slipk.localhost
D4-87-88-77-9B-13 | Goat-PC | Goat.localhost
Far Better.
You must cultivate the practice of spoofing your MAC address, computer name, and hostname on your PC prior to connecting to any network.
1. Spoofing Your MAC Address
- macOS: Download SpoofMAC program here: https://github.com/feross/SpoofMAC
Later, use Terminal to execute this command:
(use "ifconfig" to determine your wireless interface)
Code: Select all
sudo spoof-mac randomize en1
- Windows: Install TMAC: https://www.technitium.com/tmac
Ensuring you select the correct adapter before changing the MAC address.
Use "ipconfig" in command prompt to determine your network card for change and confirm it has been changed after.
- Linux: Utilize specific commands in the Terminal for Linux.
Installation:
Code: Select all
sudo apt-get update && sudo apt-get install macchanger -y
After, type:
Code: Select all
sudo ifconfig wlan1 down
sudo macchanger -r wlan1
sudo ifconfig wlan1 up
(wlan1 is just an example, may be different for you)
2. Spoofing Hostname/Computer
- macOS: To achieve this, please follow these steps meticulously.
Initially, navigate to "System Preferences", proceed to "Sharing", and subsequently access the option to Modify Computer Name. It's imperative to adjust your system preferences prior to executing the hostname command provided below, as there may be instances where it fails to take effect. Below, I demonstrate the alteration of my hostname to "Hellcat".
Type in terminal:
Code: Select all
sudo scutil --set HostName Hellcat
This command shall alter the hostname of your Mac device. This designation is the applicable name within the local network, ex. Hellcat.local
By entering this command, the user can view the PC name in Finder that is user-friendly, such as Hellcat.
Code: Select all
sudo scutil --set LocalHostName Hellcat
- Windows 10/11: Run as admin the Command Prompt
Code: Select all
wmic computersystem where name="%COMPUTERNAME%" call rename name="THENAMEYOUWANT"
shutdown /r
(You're required to reboot your PC for the modifications to take effect).
- Linux: To ascertain your hostname, kindly access the Terminal and input the command "hostname". In the subsequent illustration, I shall simulate a modification of my hostname to "Elite".
Code: Select all
sudo hostname Elite
If you have diligently adhered to these procedures, it's now deerned reasonably "secure" to connect to a Wi-Fi network and be assured that in the event of any logging, you consistently appear as a random connection to the Wi-Fi network on each occasion. Embrace anonymity like a *****ing specter!