Vulnerability Development mailing list archives
Re: MacOS X 10.1.4 MAC Address Spoofing
From: jsyn <jsyn () nthought com>
Date: Sun, 26 May 2002 19:45:07 -0700
On Sun, May 26, 2002 at 01:11:36AM -0500, Juan M. Courcoul wrote:
Is MacOS X spoof-proof out of the box ? Is it spoofable with additional software ? We may be setting up a student lab with the new e-Macs and I'd like to ascertain whether you can trust a Mac MAC address for authentication purposes or not.
See Peter Bartoli's Darwin etherspoof patch: http://slagheap.net/etherspoof/ jsyn
Current thread:
- WinNT and previously used passwords KF (May 24)
- Re: WinNT and previously used passwords Kit (May 25)
- RE: WinNT and previously used passwords V (May 25)
- MacOS X 10.1.4 MAC Address Spoofing Juan M. Courcoul (May 26)
- Re: MacOS X 10.1.4 MAC Address Spoofing jsyn (May 27)
- MacOS X 10.1.4 MAC Address Spoofing Juan M. Courcoul (May 26)
- RE: WinNT and previously used passwords Jesper M. Johansson (May 25)
- Re: WinNT and previously used passwords Kevin Finisterre (May 25)
- Re: WinNT and previously used passwords Roland Postle (May 26)
- RE: WinNT and previously used passwords Brett Moore (May 26)
- <Possible follow-ups>
- RE: WinNT and previously used passwords Seymour, Keith (May 28)
- RE: WinNT and previously used passwords Keith T. Morgan (May 28)