MAC 地址绑定攻击
一、MAC绑定
管理员误以为MAC绑定是一种安全机制
限制可以关联的客户端MAC地址
准备AP
- AP基本配置
- 开启无线过滤
修改MAC地址绕过过滤
二、演示
1、路由器限制
2、网卡修改MAC并接入WiFi
┌──(root💀kali)-[/home/kali] └─# iwconfig lo no wireless extensions. eth0 no wireless extensions. wlan0 IEEE 802.11 ESSID:off/any Mode:Managed Access Point: Not-Associated Tx-Power=20 dBm Retry short long limit:2 RTS thr:off Fragment thr:off Encryption key:off Power Management:off ┌──(root💀kali)-[/home/kali] └─# ifconfig wlan0 down 1 ⨯ ┌──(root💀kali)-[/home/kali] └─# macchanger -m 7A:56:70:E8:D4:3E wlan0 #7A:……:3E 地址的获取,可通过 airodump-ng wlan0mon 侦听推测允许连接的 MAC 地址 Current MAC: 1c:bf:ce:3b:5f:be (unknown) Permanent MAC: 1c:bf:ce:3b:5f:be (unknown) New MAC: 7a:56:70:e8:d4:3e (unknown) ┌──(root💀kali)-[/home/kali] └─# ifconfig wlan0 up ┌──(root💀kali)-[/home/kali] └─# ifconfig eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 10.10.10.135 netmask 255.255.255.0 broadcast 10.10.10.255 inet6 fe80::20c:29ff:fee1:6677 prefixlen 64 scopeid 0x20<link> ether 00:0c:29:e1:66:77 txqueuelen 1000 (Ethernet) RX packets 14 bytes 2778 (2.7 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 71 bytes 6768 (6.6 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 8 bytes 400 (400.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 8 bytes 400 (400.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 wlan0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.0.105 netmask 255.255.255.0 broadcast 192.168.0.255 inet6 fe80::68eb:d6e0:4201:e552 prefixlen 64 scopeid 0x20<link> ether 7a:56:70:e8:d4:3e txqueuelen 1000 (Ethernet) #注意MAC地址,由于当前与AP相连的设备有两个MAC相同的STA,所以在AP传信息给STA时会有丢包的情况(发给另一个相同MAC的STA了) RX packets 165 bytes 28960 (28.2 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 81 bytes 10301 (10.0 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 ┌──(root💀kali)-[/home/kali] └─# ping www.baidu.com PING www.a.shifen.com (36.152.44.96) 56(84) bytes of data. 64 bytes from 36.152.44.96 (36.152.44.96): icmp_seq=1 ttl=128 time=4.06 ms 64 bytes from 36.152.44.96 (36.152.44.96): icmp_seq=2 ttl=128 time=5.52 ms
不忘初心,方得始终。
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· Linux系列:如何用 C#调用 C方法造成内存泄露
· AI与.NET技术实操系列(二):开始使用ML.NET
· 记一次.NET内存居高不下排查解决与启示
· 探究高空视频全景AR技术的实现原理
· 理解Rust引用及其生命周期标识(上)
· DeepSeek 开源周回顾「GitHub 热点速览」
· 物流快递公司核心技术能力-地址解析分单基础技术分享
· .NET 10首个预览版发布:重大改进与新特性概览!
· AI与.NET技术实操系列(二):开始使用ML.NET
· 单线程的Redis速度为什么快?