Related Reads
Hello, today i will be showing you a small guide to using the NoobSecToolkit tool to Spoof the MAC Address of your device for Anonymity ,Security, and confidentiality reasons.
When Nick meets Mack!
Every NIC has a hardware address that’s known as a MAC, for Media Access Control. Where IP addresses are associated with TCP/IP (networking software), MAC addresses are linked to the hardware of network adapters.
Remember all this is, is hardware and software working together, IP addresses and MAC addresses working together.
The MAC address is sometimes referred to as a networking hardware address, the burned-in address (BIA), or the physical address. Here’s an example of a MAC address for an Ethernet NIC:
00:0a:95:9d:68:16.A MAC address itself doesn’t look anything like an IP address. The MAC address is a string of usually six sets of two-digits or characters, separated by colons.
Having such a unique identifier used on the local network can harm your privacy. for example:
If you use your laptop to connect to several Wi-Fi networks, the same MAC address of your Wi-Fi interface is used on all those local networks. Someone observing those networks can recognize your MAC address and track your geographical location.
Using your own computer on a network that you use frequently, for example at a friend’s place, at work, at university, etc. You have a strong relationship with this place but MAC address spoofing hides the fact that your computer is connected to this network at a particular time
NoobSecToolkit will call a script that will change the MAC address of your network interfaces to random values for the time of a working session. This is what we call “MAC address spoofing”. MAC address spoofing hides the serial number of your network interface, and somewhat, who you are, to the local network.
Please keep in mind on some network interfaces, MAC address spoofing is not possible due to limitations in the hardware or in Linux.
We will want to start by cloning NoobSecToolkit Version 2 to our file system to do this
(1) CTRL + ALT + T (Open Terminal) (2) git clone https://github.com/krintoxi/NoobSecToolkit.git (3) cd NoobSecToolkit/NoobSecToolkit/ (4) python NSToolkit.py
Once the Toolkit launches, it will ask “What do you want to do : ” in this case, we will type: macspoof
this will launch the Mac Spoofing script, which will ask you if you want to continue, type : y and hit enter
This will temporarily spoof your device Mac Address for the current session hiding who you are on the local network , and show you the results. Keep in mind that once your device is rebooted , your spoofed address will reset itself.
————————
Real World Example.
————————-
The NSA , FBI, among other agencies actively use MAC Address identification to target groups and objectives. A main example would be how they used this tactic to hunt down and arrest Lulzsec hackers!
According to the complaint against Jeremy Hammond, aka “sup_g” his physical residence in Chicago (US), was under continuous surveillance after being identified as a LulzSec member, FBI agents measured his wireless router signal strength and determined that it was located towards the rear of his home.They then applied for a court order to monitor all traffic coming in and out of that router with a trap and trace device identifying all unique MAC addresses connected to the router, an FBI expert then linked the suspect’s computer MAC address with an IP connected to the tor network (first node).
I hope this information was useful to some of you, thank you.
Did You Know?
Cybrary has tons of FREE training resources!
For lifetime access simply CREATE A FREE ACCOUNT.
Already a member? login here.
We recommend always using caution when following any link
Are you sure you want to continue?
Please check out the latest update on Tool-Kit Development here!
https://www.cybrary.it/forums/topic/counter-intelligence-tool-kit-development-nstool-kit-pro/
hi The Chosen One,
cd NoobSecToolkit/NoobSecToolkit no such file or directory.
How do I resolve it?
Fixed:
NOTE YOU SHOULD ADD : if the python env is >py3 you should run :
python2 NSToolkit.py
How about python 3.5 ? you use the sintax of 2.7 and even if i run 2to3 i cannot fix the print errors:
2to3 -f all -f print NSToolkit.py
RefactoringTool: Skipping optional fixer: buffer
RefactoringTool: Skipping optional fixer: idioms
RefactoringTool: Skipping optional fixer: set_literal
RefactoringTool: Skipping optional fixer: ws_comma
RefactoringTool: Refactored NSToolkit.py
— NSToolkit.py (original)
+++ NSToolkit.py (refactored)
@@ -3,68 +3,68 @@
import os
import sys, traceback
#Title AREA
-print “~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”
-print “NOOB Security Toolkit 2.0 – BETA”
-print “~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”
-print “Dev: The_Chosen_One”
-print “~~~~~~~~~~~~~~~~~~~”
+print(“~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”)
+print(“NOOB Security Toolkit 2.0 – BETA”)
+print(“~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”)
+print(“Dev: The_Chosen_One”)
+print(“~~~~~~~~~~~~~~~~~~~”)
#End Of Title Area
#Start Of Options
-print “*****************”
-print “Toolkit Options:”
-print “*****************”
-print “—————-”
-print “(sqli)SQL Injector”
-print “(vulscan) Vulnerability Scanner”
-print “(dinfo) Gather Basic Domain Info”
-print “(apf) Admin Page Finder”
-print “(discover) Information Harvester (Kali Linux Only!)”
-print “—————–”
+print(“*****************”)
+print(“Toolkit Options:”)
+print(“*****************”)
+print(“—————-“)
+print(“(sqli)SQL Injector”)
+print(“(vulscan) Vulnerability Scanner”)
+print(“(dinfo) Gather Basic Domain Info”)
+print(“(apf) Admin Page Finder”)
+print(“(discover) Information Harvester (Kali Linux Only!)”)
+print(“—————–“)
#Extra Options
-print “******************”
-print “Security Options:”
-print “******************”
-print “(macspoof) Spoof Mac Address”
-print “(itor) install Tor”
-print “(stor) Start Tor”
-print “(tors) Check Tor Status”
-print “(vpn) VPN Launcher”
-print “(encdns) Encrypt DNS”
-print “(quit) – (home) – (clear)”
-print “————————–”
+print(“******************”)
+print(“Security Options:”)
+print(“******************”)
+print(“(macspoof) Spoof Mac Address”)
+print(“(itor) install Tor”)
+print(“(stor) Start Tor”)
+print(“(tors) Check Tor Status”)
+print(“(vpn) VPN Launcher”)
+print(“(encdns) Encrypt DNS”)
+print(“(quit) – (home) – (clear)”)
+print(“————————–“)
def loopfunc():
#Script Input
– print “”
– choice = raw_input(“What do you want to do?:”)
+ print(“”)
+ choice = input(“What do you want to do?:”)
if choice == “apf”:
cmd1 = os.system (“perl scripts/finder.pl”)
if choice == “macspoof”:
– print “Loading Mac Spoof….”
+ print(“Loading Mac Spoof….”)
cmd1 = os.system (“python scripts/macspoof.py”)
if choice == “sqli”:
– print “Launching SQLI Injector….”
+ print(“Launching SQLI Injector….”)
cmd1 = os.system (“sudo python scripts/sqli.py”)
if choice == “vulscan”:
– print “Launching NiktoST.pl….”
+ print(“Launching NiktoST.pl….”)
cmd1 = os.system (“sudo python scripts/vulscan.py”)
#Start of Misc Options
if choice == “itor”:
– print”Installing Tor….”
+ print(“Installing Tor….”)
cmd1 = os.system (“sudo apt-get install tor”)
if choice == “stor”:
– print “Starting Tor….”
+ print(“Starting Tor….”)
cmd1 = os.system (“sudo service tor start”)
if choice == “tors”:
– print “—————-”
– print “Tor Status Check”
– print “—————-”
+ print(“—————-“)
+ print(“Tor Status Check”)
+ print(“—————-“)
cmd1 = os.system (“sudo service tor status”)
#if choice == “dvpn”:
@@ -76,31 +76,31 @@
# Start VPN broken
if choice == “vpn”:
– print “Starting VPN Launcher for Bitmask….”
+ print(“Starting VPN Launcher for Bitmask….”)
cmd1 = os.system (“sudo python scripts/vpn.py”)
if choice == “discover”:
– print “Launching Discover…. By: Lee Baird”
+ print(“Launching Discover…. By: Lee Baird”)
cmd1 = os.system (“sudo git clone git://github.com/leebaird/discover.git /opt/discover/”)
cmd1 = os.system (“cd /opt/discover/”)
cmd1 = os.system (“/opt/discover/./discover.sh”)
if choice == “dinfo”:
– print “Launching NSlookup Script…”
+ print(“Launching NSlookup Script…”)
cmd1 = os.system (“python scripts/dns.py”)
if choice == “encdns”:
– print “Launching DNS Encryption Install!…..”
+ print(“Launching DNS Encryption Install!…..”)
cmd1 = os.system (“sudo git clone git://github.com/simonclausen/dnscrypt-autoinstall.git dloads/”)
cmd1 = os.system (“cd scripts/”)
cmd1 = os.system (“./dloads/dnscrypt-autoinstall.sh”)
if choice == “clear”:
cmd1 = os.system (“clear”)
– print “————–”
– print “Fresh Terminal”
– print “————–”
+ print(“————–“)
+ print(“Fresh Terminal”)
+ print(“————–“)
if choice == “home”:
cmd1 = os.system (“python NSToolkit.py”)
@@ -109,7 +109,7 @@
if choice == “exit” or choice == “quit” or choice == “q”:
sys.exit()
else:
– print “We are done here!”
+ print(“We are done here!”)
loopfunc()
loopfunc()
RefactoringTool: Files that need to be modified:
RefactoringTool: NSToolkit.py
> python NSToolkit.py
File “NSToolkit.py”, line 6
print “~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~”
^
SyntaxError: Missing parentheses in call to ‘print’
>
Check this out! https://juliar.org
SAY HELLO TO THE FUTURE AND GOODBYE TO THE PAST!
@THEBATKING Pathetic attempt at an extension to a language, with multiple 0dayz 🙂