Downloads

Keywords:

Computer Network, Mac Address, Mac Address Types, Mac Spoofing, Kali Linux, Macchanger Tool.

Computer Network: An Implementation of MAC Spoofing

Authors

lalit jain1

Abstract

An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.

 

Article Details

Published

2023-05-16

Section

Articles

License

Copyright (c) 2023 International Journal of Engineering and Computer Science Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

How to Cite

Computer Network: An Implementation of MAC Spoofing . (2023). International Journal of Engineering and Computer Science, 12(05), 25717-25721. https://doi.org/10.18535/ijecs/v12i05.4733