NoobSec Toolkit v2: MAC Address spoofing for Anonymity and Security

October 29, 2015 | Views: 3118

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hello, today i will be showing you a small guide to using the NoobSecToolkit tool to Spoof the MAC Address of your device for Anonymity ,Security, and confidentiality reasons.

When Nick meets Mack!
Every NIC has a hardware address that’s known as a MAC, for Media Access Control. Where IP addresses are associated with TCP/IP (networking software), MAC addresses are linked to the hardware of network adapters.  

Remember all this is, is hardware and software working together, IP addresses and MAC addresses working together.

The MAC address is sometimes referred to as a networking hardware address, the burned-in address (BIA), or the physical address. Here’s an example of a MAC address for an Ethernet NIC:

00:0a:95:9d:68:16.A MAC address itself doesn’t look anything like an IP address. The MAC address is a string of usually six sets of two-digits or characters, separated by colons.

Having such a unique identifier used on the local network can harm your privacy. for example:

If you use your laptop to connect to several Wi-Fi networks, the same MAC address of your Wi-Fi interface is used on all those local networks. Someone observing those networks can recognize your MAC address and track your geographical location.

 

 

Using your own computer on a network that you use frequently, for example at a friend’s place, at work, at university, etc. You have a strong relationship with this place but MAC address spoofing hides the fact that your computer is connected to this network at a particular time

NoobSecToolkit will call a script that will change the MAC address of your network interfaces to random values for the time of a working session. This is what we call “MAC address spoofing”. MAC address spoofing hides the serial number of your network interface, and somewhat, who you are, to the local network.

Please keep in mind on some network interfaces, MAC address spoofing is not possible due to limitations in the hardware or in Linux.

We will want to start by cloning NoobSecToolkit Version 2 to our file system to do this

(1) CTRL + ALT + T (Open Terminal)
(2) git clone https://github.com/krintoxi/NoobSecToolkit.git
(3) cd NoobSecToolkit/NoobSecToolkit/
(4) python NSToolkit.py

Once the Toolkit launches, it will ask  “What do you want to do : ” in this case, we will type: macspoof

this will launch the Mac Spoofing script, which will ask you if you want to continue, type : y and hit enter

This will temporarily spoof your device Mac Address for the current session hiding who you are on the local network , and show you the results. Keep in mind that once your device is rebooted , your spoofed address will reset itself.

————————

Real World Example.

————————-

The NSA , FBI, among other agencies actively use MAC Address identification to target groups and objectives. A main example would be how they used this tactic to hunt down and arrest Lulzsec hackers!

According to the complaint against Jeremy Hammond, aka “sup_g” his physical residence in Chicago (US), was under continuous surveillance after being identified as a LulzSec member, FBI agents measured his wireless router signal strength and determined that it was located towards the rear of his home.They then applied for a court order to monitor all traffic coming in and out of that router with a trap and trace device identifying all unique MAC addresses connected to the router, an FBI expert then linked the suspect’s computer MAC address with an IP connected to the tor network (first node).

 

I hope this information was useful to some of you, thank you.

 

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
26 Comments
  1. hi The Chosen One,
    cd NoobSecToolkit/NoobSecToolkit no such file or directory.
    How do I resolve it?

  2. Fixed:
    NOTE YOU SHOULD ADD : if the python env is >py3 you should run :
    python2 NSToolkit.py

  3. How about python 3.5 ? you use the sintax of 2.7 and even if i run 2to3 i cannot fix the print errors:
    2to3 -f all -f print NSToolkit.py
    RefactoringTool: Skipping optional fixer: buffer
    RefactoringTool: Skipping optional fixer: idioms
    RefactoringTool: Skipping optional fixer: set_literal
    RefactoringTool: Skipping optional fixer: ws_comma
    RefactoringTool: Refactored NSToolkit.py
    — NSToolkit.py (original)
    +++ NSToolkit.py (refactored)
    @@ -3,68 +3,68 @@
    import os
    import sys, traceback
    #Title AREA
    -print “~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”
    -print “NOOB Security Toolkit 2.0 – BETA”
    -print “~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”
    -print “Dev: The_Chosen_One”
    -print “~~~~~~~~~~~~~~~~~~~”
    +print(“~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”)
    +print(“NOOB Security Toolkit 2.0 – BETA”)
    +print(“~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”)
    +print(“Dev: The_Chosen_One”)
    +print(“~~~~~~~~~~~~~~~~~~~”)
    #End Of Title Area
    #Start Of Options
    -print “*****************”
    -print “Toolkit Options:”
    -print “*****************”
    -print “—————-”
    -print “(sqli)SQL Injector”
    -print “(vulscan) Vulnerability Scanner”
    -print “(dinfo) Gather Basic Domain Info”
    -print “(apf) Admin Page Finder”
    -print “(discover) Information Harvester (Kali Linux Only!)”
    -print “—————–”
    +print(“*****************”)
    +print(“Toolkit Options:”)
    +print(“*****************”)
    +print(“—————-“)
    +print(“(sqli)SQL Injector”)
    +print(“(vulscan) Vulnerability Scanner”)
    +print(“(dinfo) Gather Basic Domain Info”)
    +print(“(apf) Admin Page Finder”)
    +print(“(discover) Information Harvester (Kali Linux Only!)”)
    +print(“—————–“)
    #Extra Options
    -print “******************”
    -print “Security Options:”
    -print “******************”
    -print “(macspoof) Spoof Mac Address”
    -print “(itor) install Tor”
    -print “(stor) Start Tor”
    -print “(tors) Check Tor Status”
    -print “(vpn) VPN Launcher”
    -print “(encdns) Encrypt DNS”
    -print “(quit) – (home) – (clear)”
    -print “————————–”
    +print(“******************”)
    +print(“Security Options:”)
    +print(“******************”)
    +print(“(macspoof) Spoof Mac Address”)
    +print(“(itor) install Tor”)
    +print(“(stor) Start Tor”)
    +print(“(tors) Check Tor Status”)
    +print(“(vpn) VPN Launcher”)
    +print(“(encdns) Encrypt DNS”)
    +print(“(quit) – (home) – (clear)”)
    +print(“————————–“)
    def loopfunc():
    #Script Input
    – print “”
    – choice = raw_input(“What do you want to do?:”)
    + print(“”)
    + choice = input(“What do you want to do?:”)

    if choice == “apf”:
    cmd1 = os.system (“perl scripts/finder.pl”)

    if choice == “macspoof”:
    – print “Loading Mac Spoof….”
    + print(“Loading Mac Spoof….”)
    cmd1 = os.system (“python scripts/macspoof.py”)

    if choice == “sqli”:
    – print “Launching SQLI Injector….”
    + print(“Launching SQLI Injector….”)
    cmd1 = os.system (“sudo python scripts/sqli.py”)

    if choice == “vulscan”:
    – print “Launching NiktoST.pl….”
    + print(“Launching NiktoST.pl….”)
    cmd1 = os.system (“sudo python scripts/vulscan.py”)

    #Start of Misc Options
    if choice == “itor”:
    – print”Installing Tor….”
    + print(“Installing Tor….”)
    cmd1 = os.system (“sudo apt-get install tor”)

    if choice == “stor”:
    – print “Starting Tor….”
    + print(“Starting Tor….”)
    cmd1 = os.system (“sudo service tor start”)

    if choice == “tors”:
    – print “—————-”
    – print “Tor Status Check”
    – print “—————-”
    + print(“—————-“)
    + print(“Tor Status Check”)
    + print(“—————-“)
    cmd1 = os.system (“sudo service tor status”)

    #if choice == “dvpn”:
    @@ -76,31 +76,31 @@
    # Start VPN broken

    if choice == “vpn”:
    – print “Starting VPN Launcher for Bitmask….”
    + print(“Starting VPN Launcher for Bitmask….”)
    cmd1 = os.system (“sudo python scripts/vpn.py”)

    if choice == “discover”:
    – print “Launching Discover…. By: Lee Baird”
    + print(“Launching Discover…. By: Lee Baird”)
    cmd1 = os.system (“sudo git clone git://github.com/leebaird/discover.git /opt/discover/”)
    cmd1 = os.system (“cd /opt/discover/”)
    cmd1 = os.system (“/opt/discover/./discover.sh”)

    if choice == “dinfo”:
    – print “Launching NSlookup Script…”
    + print(“Launching NSlookup Script…”)
    cmd1 = os.system (“python scripts/dns.py”)

    if choice == “encdns”:
    – print “Launching DNS Encryption Install!…..”
    + print(“Launching DNS Encryption Install!…..”)
    cmd1 = os.system (“sudo git clone git://github.com/simonclausen/dnscrypt-autoinstall.git dloads/”)
    cmd1 = os.system (“cd scripts/”)
    cmd1 = os.system (“./dloads/dnscrypt-autoinstall.sh”)

    if choice == “clear”:
    cmd1 = os.system (“clear”)
    – print “————–”
    – print “Fresh Terminal”
    – print “————–”
    + print(“————–“)
    + print(“Fresh Terminal”)
    + print(“————–“)

    if choice == “home”:
    cmd1 = os.system (“python NSToolkit.py”)
    @@ -109,7 +109,7 @@
    if choice == “exit” or choice == “quit” or choice == “q”:
    sys.exit()
    else:
    – print “We are done here!”
    + print(“We are done here!”)

    loopfunc()
    loopfunc()
    RefactoringTool: Files that need to be modified:
    RefactoringTool: NSToolkit.py
    > python NSToolkit.py
    File “NSToolkit.py”, line 6
    print “~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”
    ^
    SyntaxError: Missing parentheses in call to ‘print’
    >

  4. Check this out! https://juliar.org
    SAY HELLO TO THE FUTURE AND GOODBYE TO THE PAST!

Page 4 of 4«1234
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel