Macof tool free download
On Ethernet, multicast frames are identified by a special group bit being set to 1. It is the low-order bit of the high-order byte. Switches should not learn source addresses whose group bit is set. The presence of the group bit is legitimate only when present in a destination MAC address. The IEEE Note that the supplied station address shall not have the group bit set and shall not be the null address.
If your LAN switch learns those frames, consider having a conversation with the switch's vendor. That being said, macof is essentially a brute-force tool and, as such, it does not embarrass itself by abiding official IEEE standards. It generates both valid and illegitimate source MAC addresses. As a matter of fact, some switches are known to learn such addresses! Regardless, a hacker is probably not going to start macof to generate just five MAC addresses.
The strength of the tool is the sheer speed at which it can produce an impressive number of random addresses and source traffic from them, as Example shows. In a matter of seconds between 7 and 8, in this case , more than 50, MAC addresses are injected on a port using a regular Intel Pentium 4-based PC running Linux. It also provides advices and examples covering the most common use-cases. You can also read this practical use-case , part of a series on network layer 2 exploitation and protection.
Please send bug reports to the macof. In this article: macof. Comment by email. Sign in. Forgot your password? Get help.
Password recovery. Kali Linux Tutorials. Home Stress Testing macof. Stress Testing Tutorials. Homepage Options Syntax: macof [-i interface] [-s src] [-d dst] [-e tha] [-x sport] [-y dport] [-n times] -i interface Specify the interface to send on.
Implementation of Please enter your comment! Please enter your name here. You have entered an incorrect email address!
0コメント