How to Change(Spoof) Your MAC Address


Introduction: How to Change(Spoof) Your MAC Address

The first question you might have about this instructable is why would I need to spoof my MAC address. Well , there are two answers. One, you need to change your MAC address so you network will recognize your device and allow it to connect . Two, for malicious purposes you may need to spoof you MAC address so you could gain access to networks or to hide who you really are. Spoofing your MAC address is legal and can be done safely within Windows without any external software. If you use this to spoof you MAC address for Malicious purposes I cannot be held responsible.

Step 1: Finding the Device That You Want to Spoof

The first step in spoofing your MAC address is to find the network interface device that you want to spoof. Go to Start>Control Panel>Network Connection. Then double click on the device that you want to spoof. Then click on the support tab and then click on details. Then in the list you will see the MAC address.

Step 2: Spoof the Mac Address

To spoof the address go to Control Panel>Network Connections. Then right click on the connection you want to spoof and select properties. Now go to the advanced tab and click on Network Address. Then select the black box and type the MAC address you want to have. The form is 00:00:00:00:00:00.

Step 3: Now Get Going

You have no successfully spoofed your first MAC address and now you can look like what ever device you please. I hope this has helped you and if you have any questions feel free to comment below. Thanks.



    • Creative Misuse Contest

      Creative Misuse Contest
    • Oil Contest

      Oil Contest
    • Water Contest

      Water Contest

    32 Discussions

    Jason, CEO/Lead Engineer JNETechnologies. FMR--USAF Special Operations Command at A.F. Information Warfare Center FL, NV.. Simply put, I assign a =<0.0 value to any "Trace" objectives. If attempting to spoof BIG BROTHER, know this value. Mac ID Properties Emulation and Manipulation (MIPEN), my pen, abilities would NEVER exist if we did not conceive it. Further, I heard a story, from a guy, went like this: Iraq was enriching an element via centrifugal methods. There was a software CDD. This PCUI directly accessed and modulated a DCM which had had it's and 3217 of it's partner's MAC ID modified. Guess what? Found first round. Then deployit.exe. I can untangle ANY EMI's at will with a single (GOV) snap-in.FYI

    2 replies

    help 911 for me contact me at please

    Good stuff, and very interesting. Things used to be so much simpler, when the source to Stuxnet was introduced to Iran's Nuclear facility. They should upgrade their policies, to mimic those of their enemy.

    How do I prevent someone from spoofing all of my devices and my husbands. It's been 2 years since it started and I can't lose them. Please can anyone help me. Life's been hard since it began. Please message me and give me info on this subject if you can help. I'm totally illiterate to computers and their language lol. Don't understand

    Well about this theme is very cool to bring it on. Do you know that Mac Spoofing is not illegal....?????? Well yes give a check out. So the question is if Mac Addresses is a layer 2 operation that occurs inside your network.What the hell I will do with that? I use a laptop with "Kali" installed in it.

    In places that I want to see if the Wireless is secure I connect with and use the software aircrack to obtain info of the Access Point on the Place. And then I copy one of this mac address to my wifi card and connect it to the Network. And I gain access in no time.

    The only way to avoid this is using MAC Filtering if the router has the capability activated.


    2 years ago

    Hello, Im not very good with advance stuff, so basically If my computer gets perma banned from a game for example.

    What would i have to change in order for them not to find out its me, If i change IP then MAC will also need to be changed? other wise its a matter of time before they realise its you. I use FlyVPN that changes IP but is that enough?

    7 replies

    If its and IP ban youll need a VPN, or VPN software.

    but most people will have a dynamic ip, so when the ip changes the ban should be gone

    That is not true. They have some information on their SQL Database to identify you if you use your pc again or laptop to access and meanwhile you try to access this info will be match and you still could not access.

    Your MAC address doesn't operate (matter) anywhere above the Data Link layer (your home network), so it has nothing to do with a game server. If you are still banned, try using a different VPN, or changing your IP adress manually < look it up. You may also need to change your game key, which may be banned. Look that up as well, it depends on what game you are playing.

    You have it backwards. Your IP address only matters in a home network. Your MAC address is everything. That's why every network card has to be assigned a unique MAC adress.

    Well you will be surprised that the process of accessing a web server lets say Google. They do not have neither your router mac address, neither your device mac address, and neither your private ip addressing. Yes they have your provider name using the ip addressing that is unique and public.

    Let me give you a flash example of me using Netflix you can try this at home like educational purposes. I fly to from Mexico to Philadelphia. When I access Netflix because of the IP Addressing they gave me the menu of USA Netflix. I was checking for "La Reina del Paraiso" so was not there. I went to google and I search for "proxy server list for free" so one of Mexico appears. I put that in my browser. And also do a test using what is my ip site. For Netflix I am in mexico with the changes I did on the browser connection. So I access my favorite series of Mexico. So try this with different places you will see how cool it is.

    Mac Addresses is a Layer 2 Operation in the Osi Model. So when you are banned in a website the info they have from you is your ISP IP ADDRESS, maybe the Operating System you are Using and Browser info using a basic php configuration web program. So in theory yes you can go like somebody else in this site. But remember if they banned you account that is another topic.


    1 year ago

    I dont have that optio for my router>> what do i do

    Any method for iPhone? It's not public but password protected wifi (work) trying to keep myself from being banned. They block MAC addresses after a few days of connection...

    1 reply

    MAC address spoofing on iPhones/iOS is very dangerous will force you to restore.

    Please make my job cooler. Stop sneaking through our GOV encryption layers and then up and leave. What the hell. Do you simply need to know? At least try to copy or modify any part of our network/data. Then I can have some below.

    HERE WE GO.... OK. Readers, know that even each PC, TV, produced using a vast number of comprising pieces of hardware, each having it's own unique MacID. This makes conclusive ID even easier and without doubt. Do the math If x=number of MacID's within a, say, laptop, a low end would be x=(x)x2. Do the math. figure 100 ID's internally. Now x=100x100x100. 100x100=10000. So, 10000x10000=100,000,000. Now, account for appx. 350(x), an iPad. From mic. to cam., to, touch sense, to, Bluetooth adaptor.... that is the ONLY device on earth containing these exact groupings of device MacID's.

    Try a VWAN. Tweek at least PC MacID. Proceed to create say 40 VM's on your VWAN. Tweek Location Services, PC Time and map out 38 hops in route. The more Mac's you tweek the better. BUT!!! DO NOT MESS WITH THE TIER 5 GOV AGENCIES!!! We introduced MIPEM before creating algorithms to deal with this paradox of variables with regards to Trace Identification Protocol. TIP. read beloy and then again below... TY.J

    deployit.exe took a whopping 512K on a FD. In other words, do not attempt to spoof through ANY government or, especially military port. As similar to below, it is now considered a rudimentary layer of our .GOV firewalls. Only one way, physically. TM have to a


    2 years ago