banner



How To Use Mac Makeup Software

_____
/ ____|
| |  __
| | |_ |
| |__| |
\_____|
___
/ _ \
| (_) |
\___/
_ __
| '__|
| |
|_|
_
| |
| |
| |
| |
|_|
__ _
/ _` |
| (_| |
\__,_|
_ __
| '_ \
| | | |
|_| |_|
_
(_)
_
| |
| |
|_|
___    ___    _ __ ___
/ __|  / _ \  | '_ ` _ \
_  | (__  | (_) | | | | | | |
(_)  \___|  \___/  |_| |_| |_|

Reverse, Repurpose, Resolve

MacMakeup dates back to Windows 2000 era and was later updated to work on Windows XP. That was a lot of time ago. Information technology existed in several flavors and was used in several contexts, from didactics to law enforcement. This was my starting time public software that created me some problems, other than giving me some satisfaction.

I removed the software from my site considering it was marked equally a "virus" but a lot of people continued to enquire me if an updated version was available.
Well, finally it is :-)

Back to the basics. Why should I spoof my accost?

I'm assuming you know what a MAC address is. If not, Wikipedia may requite you lot a hint.
In the time I talked with people who found very funny and unexpected uses for MacMakeup, hence in the MAC amending process itself. If you are among them and want to share your idea, just write me.
MAC addresses are a mean to have your device globally unique. I mean on a planetary scale. No two MAC addresses should exist the aforementioned. So in the time this accost was used to uniquely identify your device for licensing or security purposes.

  • I recently discovered that TeamViewer seems to use the MAC address to identify your device and decide whether or not you're making "commercial" use of the software. Only google for it.
  • Another use of a new MAC accost if to brand passive fingerprinting/contour building more than difficult. Several network software or appliances present try to build "profiles" of network devices. Having layer ii information is considered (?) more solid than layer 3 addresses that change often, especially when DHCPs are involved.
  • Talking about DHCP, they tend to re-assign IPs to known MAC addresses, so you may merely need a unlike IP to test something, despite the DHCP intentions.
  • On a WiFi network you lot may discover that only some MAC addresses are immune past the access points, so you can infringe i of them taking care o to employ it when the owners are online.
  • During several pen-testing acts you may need to create specific MAC addresses, or discard used ones for new ones.
  • As I said before, some licensing schemes consider your MAC as the unique identifier to demark a specific license. I would unremarkably say you must not use this method to bypass some sort of licensing, but since information technology is very stupid it may be an incentive for people to discover better protection algorythms.
  • You lot may spoof addresses on your devices to make it simpler to distinguish their traffic, for example when capturing traffic on decorated networks (y'all can create "your own" OIDs).
  • You can just want a MAC that is easy to remember (or funny, merely google for those).
  • Your suggestion here...

Usage

This is a simplified version compared to the original one, merely the basic task are accomplished in the same way. The interface is pretty elementary:
MacMakeup 2.0
To spoof your MAC address you lot just demand to:
1. Select your network interface
2. Blazon the new MAC address into the box
three. Click "Spoof"
Done! Y'all simply need to disable and enable the interface again.

If the MAC is already spoofed on an interface you can use the "Reset to original" button to go dorsum to your original ane.

Command line (scripted) usage

Since versions 2.ii.10 you tin can use MacMakeup from the command line. You lot can automate tasks similar having a new MAC at each kick, or switch from one MAC to the other in a click or following events. For example the Windows scheduler allows you to execute script based on a lot of events.
When using scripting the GUI interface does not bear witness upwards if not for critical errors, any output will be directed to a macmakeup.txt file created in the same directory the executable resides. And so you must take permission to write to that directory (do not put it in Windows32!).
You just commencement MacMakeup with some control line arguments. Valid ones are:

  • list: writes the list of available interfaces to the macmakeup.txt file. The list contains the interface GUID and the clarification. Information technology is something like:
    {6A4464B2-0FF4-4D69-B0E3-6D7DC289C41B} Bluetooth Network Connection
    {B42E9999-20A5-4F43-B12B-B7670A0D4214} Local Surface area Connexion
    {0FF40FF4-20A5-4D69-B12B-B0E3B0E3B0E3} WiFi adapter
    The role between with the {} is the interface ID we demand in the other commands.
  • set <interface ID> [NEW_MAC]: sets (spoofs) the new MAC address.
    The first parameter is the interface ID from the listing command.
    The MAC address part is (partially) optional. You can type a partial MAC address, for example 005056 (VMWare). In this example the remaining office of the MAC is randomly generated. There is no minimum or maximum number of digits you lot must laissez passer as the parameter, then if you just type the OUI of VMWare MacMakeup volition generate the host part, if yous become farther and laissez passer 00505612 only the final 4 digits will be appended. If you do not type anything at all a completely random MAC is generated.
    Examples:
    MacMakeup.exe prepare {0FF40FF4-20A5-4D69-B12B-B0E3B0E3B0E3} 005056 (generates a VMWare MAC address)
    MacMakeup.exe set {0FF40FF4-20A5-4D69-B12B-B0E3B0E3B0E3} 12345678 (generates a MAC accost starting with 12345678)
    MacMakeup.exe set {0FF40FF4-20A5-4D69-B12B-B0E3B0E3B0E3} (generates a fully random MAC address)
  • reset <interface ID>: resets the MAC address to the manufacturing plant ane
    Examples:
    MacMakeup.exe reset {0FF40FF4-20A5-4D69-B12B-B0E3B0E3B0E3}

Always look at the contents of macmakeup.txt every bit it will incorporate errors (if any) and the new MAC accost when (partially) generated.

OUI management

Starting from 2.ane.x the distribution zip contains an oui.txt file. The file is a stripped version of the one y'all tin can download here. This file is a sort of database that maps the kickoff 24 $.25 of the MAC accost to a manufacturer. For example if you see a MAC starting with 00A03F you can assume it is from a device that was made by Apple. This if at that place were no spoofed MAC addresses of course.
Loading (and working) with the OUI database is not mandatory and can slow down the program, so load them if needed by pressing "Load OUIs".
With the database loaded you can only select a manufacturer from the list and a new MAC address from that vendor will be proposed in the MAC address box. Also if you select and interface witha spoofed MAC, the presumed vendor volition exist displayed in the information area.
You tin can type function of the name of the desired vendor in the box to filter the database.
If you do not need all of the (about) 30000 manufacturers, y'all tin can reduce the file to the bunch you use most, just delete the lines you don't need. Keep in mind that only the lines containing "base of operations 16" are needed. You can easily update the file running:
curl -o - http://standards-oui.ieee.org/oui.txt | grep "base sixteen" > oui.txt
If you only demand to spoof VMWare addresses you tin can change the above command as:
curl -o - http://standards-oui.ieee.org/oui.txt | grep "base of operations sixteen" | grep VMWare > oui.txt
Y'all got the picture. Call back, the smaller the file, the faster the loading.
Starting from two.2 the list was further reduced to 12k elements, so if you need the complete 1 merely utilise the instructions above.

Permissions

You lot can launch the awarding with not administrator rights: in this instance you lot tin check the status of the interfaces and see which ones are have spoofed MAC.
To modify a MAC address you need to beginning the application with authoritative rights. Those rights are also needed to disable then enable the interface.

Platforms

This application runs on Windows platforms having the .Net framework 3.5 installed. Information technology was tested on Windows 7, Windows 10, Windows 2008, Windows 2012 and Windows 2016. If you lot tested i platform, drop me a notation.

License and disclaimer

This software is completely free, utilise information technology at your will. If you lot include it in some projection or publish it on your spider web site just drop me a note.
There is no warranty the program will work on your figurer, and no assurance it will non create a black hole or some other fancy disaster. Use it at your own risk.
Of course exercise not use it to do anything evil.

Version history

2.1.three.0: added OUI support
two.two.3.1: added command line switches to automate spoofing
2.2.3.5: pocket-sized bug fix

Download section

Version ii.2.iii.5, 2019-05-31, download it here, SHA256 is 6568052d8eb651767cc922c916d6ee06c52bf7907f83978181451c3926f33029.

Also thanks to...

Tim from Majorgeeks, that is serving fill-in copies of MacMakeup since the first releases. https://www.majorgeeks.com/files/details/mac_makeup.html

How To Use Mac Makeup Software,

Source: https://www.gorlani.com/software/mmkup.php

Posted by: michaelchfur1944.blogspot.com

0 Response to "How To Use Mac Makeup Software"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel