From the course: Cisco Network Security: Secure Routing and Switching

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

MAC spoofing

MAC spoofing

From the course: Cisco Network Security: Secure Routing and Switching

Start my 1-month free trial

MAC spoofing

- [Instructor] On a local area network, a device is identified by its MAC address. MAC spoofing changes or spoofs the MAC address on a network interface card to someone else's MAC address to allow an attacker to intercept traffic to launch a man-in-the-middle attack. Now here you see a small network with several devices. Up at the top, you see the IP address and MAC address of the attacker. What you see crossed off was the attacker's MAC address but the attacker has spoofed the MAC address to appear to be the same as HostA. When traffic is delivered, HostA and the attacker will receive the data. There are a number of different tools available to change your MAC address, and a number of different software products. I'm here at this website where you can see MAC Address Changer, but if you type in the search bar, you will come up with a number of different options to change your MAC address. A MAC address has several different naming conventions in order to identify that it is indeed…

Contents