How to Change(Spoof) Your MAC Address

499,247

32

32

Introduction: How to Change(Spoof) Your MAC Address

The first question you might have about this instructable is why would I need to spoof my MAC address. Well , there are two answers. One, you need to change your MAC address so you network will recognize your device and allow it to connect . Two, for malicious purposes you may need to spoof you MAC address so you could gain access to networks or to hide who you really are. Spoofing your MAC address is legal and can be done safely within Windows without any external software. If you use this to spoof you MAC address for Malicious purposes I cannot be held responsible.

Step 1: Finding the Device That You Want to Spoof

The first step in spoofing your MAC address is to find the network interface device that you want to spoof. Go to Start>Control Panel>Network Connection. Then double click on the device that you want to spoof. Then click on the support tab and then click on details. Then in the list you will see the MAC address.

Step 2: Spoof the Mac Address

To spoof the address go to Control Panel>Network Connections. Then right click on the connection you want to spoof and select properties. Now go to the advanced tab and click on Network Address. Then select the black box and type the MAC address you want to have. The form is 00:00:00:00:00:00.

Step 3: Now Get Going

You have no successfully spoofed your first MAC address and now you can look like what ever device you please. I hope this has helped you and if you have any questions feel free to comment below. Thanks.

Be the First to Share

    Recommendations

    • Make it Glow Contest

      Make it Glow Contest
    • First Time Author Contest

      First Time Author Contest
    • PCB Challenge

      PCB Challenge

    32 Discussions

    0
    jasonlispi
    jasonlispi

    4 years ago

    Jason, CEO/Lead Engineer JNETechnologies. FMR--USAF Special Operations Command at A.F. Information Warfare Center FL, NV.. Simply put, I assign a =<0.0 value to any "Trace" objectives. If attempting to spoof BIG BROTHER, know this value. Mac ID Properties Emulation and Manipulation (MIPEN), my pen, abilities would NEVER exist if we did not conceive it. Further, I heard a story, from a guy, went like this: Iraq was enriching an element via centrifugal methods. There was a software CDD. This PCUI directly accessed and modulated a DCM which had had it's and 3217 of it's partner's MAC ID modified. Guess what? Found first round. Then deployit.exe. I can untangle ANY EMI's at will with a single (GOV) snap-in.FYI

    0
    BetteS4
    BetteS4

    Reply 2 years ago

    help 911 for me contact me at betteonly@yahoo.com please

    0
    JS46
    JS46

    Reply 4 years ago

    Good stuff, and very interesting. Things used to be so much simpler, when the source to Stuxnet was introduced to Iran's Nuclear facility. They should upgrade their policies, to mimic those of their enemy.

    0
    CelinaA2
    CelinaA2

    3 years ago

    How do I prevent someone from spoofing all of my devices and my husbands. It's been 2 years since it started and I can't lose them. Please can anyone help me. Life's been hard since it began. Please message me and give me info on this subject if you can help. I'm totally illiterate to computers and their language lol. Don't understand

    0
    JULIOV36
    JULIOV36

    4 years ago

    Well about this theme is very cool to bring it on. Do you know that Mac Spoofing is not illegal....?????? Well yes give a check out. So the question is if Mac Addresses is a layer 2 operation that occurs inside your network.What the hell I will do with that? I use a laptop with "Kali" installed in it.

    In places that I want to see if the Wireless is secure I connect with and use the software aircrack to obtain info of the Access Point on the Place. And then I copy one of this mac address to my wifi card and connect it to the Network. And I gain access in no time.

    The only way to avoid this is using MAC Filtering if the router has the capability activated.

    0
    Cwpanc
    Cwpanc

    4 years ago

    Hello, Im not very good with advance stuff, so basically If my computer gets perma banned from a game for example.

    What would i have to change in order for them not to find out its me, If i change IP then MAC will also need to be changed? other wise its a matter of time before they realise its you. I use FlyVPN that changes IP but is that enough?

    0
    MUNEYBAG
    MUNEYBAG

    Reply 4 years ago

    If its and IP ban youll need a VPN, or VPN software.

    0
    StevenN41
    StevenN41

    Reply 4 years ago

    but most people will have a dynamic ip, so when the ip changes the ban should be gone

    0
    JULIOV36
    JULIOV36

    Reply 4 years ago

    That is not true. They have some information on their SQL Database to identify you if you use your pc again or laptop to access and meanwhile you try to access this info will be match and you still could not access.

    0
    BlakeA11
    BlakeA11

    Reply 4 years ago

    Your MAC address doesn't operate (matter) anywhere above the Data Link layer (your home network), so it has nothing to do with a game server. If you are still banned, try using a different VPN, or changing your IP adress manually < look it up. You may also need to change your game key, which may be banned. Look that up as well, it depends on what game you are playing.

    0
    JaredH45
    JaredH45

    Reply 4 years ago

    You have it backwards. Your IP address only matters in a home network. Your MAC address is everything. That's why every network card has to be assigned a unique MAC adress.

    0
    JULIOV36
    JULIOV36

    Reply 4 years ago

    Well you will be surprised that the process of accessing a web server lets say Google. They do not have neither your router mac address, neither your device mac address, and neither your private ip addressing. Yes they have your provider name using the ip addressing that is unique and public.

    Let me give you a flash example of me using Netflix you can try this at home like educational purposes. I fly to from Mexico to Philadelphia. When I access Netflix because of the IP Addressing they gave me the menu of USA Netflix. I was checking for "La Reina del Paraiso" so was not there. I went to google and I search for "proxy server list for free" so one of Mexico appears. I put that in my browser. And also do a test using what is my ip site. For Netflix I am in mexico with the changes I did on the browser connection. So I access my favorite series of Mexico. So try this with different places you will see how cool it is.

    0
    JULIOV36
    JULIOV36

    Reply 4 years ago

    Mac Addresses is a Layer 2 Operation in the Osi Model. So when you are banned in a website the info they have from you is your ISP IP ADDRESS, maybe the Operating System you are Using and Browser info using a basic php configuration web program. So in theory yes you can go like somebody else in this site. But remember if they banned you account that is another topic.

    0
    HaniL2
    HaniL2

    4 years ago

    I dont have that optio for my router>> what do i do

    0
    Hoe___Say
    Hoe___Say

    4 years ago

    Any method for iPhone? It's not public but password protected wifi (work) trying to keep myself from being banned. They block MAC addresses after a few days of connection...

    0
    BrettJ17
    BrettJ17

    Reply 4 years ago

    MAC address spoofing on iPhones/iOS is very dangerous will force you to restore.

    0
    jasonlispi
    jasonlispi

    4 years ago

    Please make my job cooler. Stop sneaking through our GOV encryption layers and then up and leave. What the hell. Do you simply need to know? At least try to copy or modify any part of our network/data. Then I can have some fun....read below.

    0
    jasonlispi
    jasonlispi

    4 years ago

    HERE WE GO.... OK. Readers, know that even each PC, TV, PDA....is produced using a vast number of comprising pieces of hardware, each having it's own unique MacID. This makes conclusive ID even easier and without doubt. Do the math If x=number of MacID's within a, say, laptop, a low end would be x=(x)x2. Do the math. figure 100 ID's internally. Now x=100x100x100. 100x100=10000. So, 10000x10000=100,000,000. Now, account for appx. 350(x), an iPad. From mic. to cam., to, touch sense, to, Bluetooth adaptor.... that is the ONLY device on earth containing these exact groupings of device MacID's.

    Try a VWAN. Tweek at least PC MacID. Proceed to create say 40 VM's on your VWAN. Tweek Location Services, PC Time and map out 38 hops in route. The more Mac's you tweek the better. BUT!!! DO NOT MESS WITH THE TIER 5 GOV AGENCIES!!! We introduced MIPEM before creating algorithms to deal with this paradox of variables with regards to Trace Identification Protocol. TIP. read beloy and then again below... TY.J

    0
    jasonlispi
    jasonlispi

    4 years ago

    deployit.exe took a whopping 512K on a FD. In other words, do not attempt to spoof through ANY government or, especially military port. As similar to below, it is now considered a rudimentary layer of our .GOV firewalls. Only one way, physically. TM have to a

    0
    AnilY7
    AnilY7

    5 years ago

    thanks.......