Spoof Identity By Changing MAC Address

October 19, 2007 at 7:16 am (Security, Tips n Tricks)

If you want to change your logical and physical identity on network, this is possibly the best way of doing that. Let me introduce you to some basic terms before I explain the trick.

Spoofing – Introducing the network with some other identity. Like changing MAC address

DHCP – This is a protocol which is responsible for allocating IP addresses to terminals for a network. It polls continously and alots an IP for exchange of MAC address

MAC & IP address – These are also called physical and logical address which represent the identity on intranet and internet respectively. MAC address is corresponding to the ethernet card which is used for the connection.

Requirements – MAC address of the machine to be spoofed with.

Spoofing Trick – The trick is to change the MAC address with a machine with higher permissions (like your boss’s terminal) . In this way DHCP will allocate an IP and permissions which are registered for changed MAC address. You can get this by typing ipconfig \all on command prompt.

Windows XP/2000 – There are two ways of doing this in windows platform.  This is depending on the type of Ethernet  Card (NIC) you have. If you have a card that doesn’t support Clone MAC address, then you have to go to second method.
Method1

a) Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.

b) Right click on the NIC you want to change the MAC address and click on properties.

c) Under “General” tab, click on the “Configure” button

d) Click on “Advanced” tab

e) Under “Property section“, you should see an item called “Network Address” or “Locally Administered Address“, click on it.

f) On the right side, under “Value“, type in the New MAC address you want to assign to your NIC. Usually this value is entered without the “” between the MAC address numbers.

g) Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes. If the changes are not materialized, then use the second method.

h) If successful, reboot your system.

Some versions show the option in LAN properties.

Method 2 – This needs a little manipulation in registry

This should work on all Windows 2000/XP systems

a) Go to Start -> Run, type “regedt32” to start registry editor. Do not use “Regedit“.

b) Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}“. Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters. You should see it starts with 0000, then 0001, 0002, 0003 and so on.

c) Find the interface you want by searching for the proper “DriverDesc” key.

d) Edit, or add, the string key “NetworkAddress” (has the data type “REG_SZ“) to contain the new MAC address.

e) Disable then re-enable the network interface that you changed (or reboot the system).

Linux

1) Bring down the interface: “ifconfig eth0 down

2) Enter new MAC address: “ifconfig eth0 hw ether 00:00:00:AA:AA:AA

3) Bring up the interface: “ifconfig eth0 up

BSD

1) Bring down the interface: “ifconfig xl0 down

2) Enter new MAC address: “ifconfig xl0 link 00:00:00:AA:AA:AA

3) Bring up the interface: “ifconfig xl0 up

Permalink Leave a Comment

Check Compatibility On Upgrading H/W

October 14, 2007 at 8:52 am (Hardware)

If you are thinking of adding a RAM size for your desktop or any other accessories on the motherboard, it is very essential for you to check the compatibility.

RAM – It is primarily classified as SDRAM and DDRAM. This incorporates single data and double data respectively. SDRAM was used in earlier systems. As far as DDRAM is concerned, it comes with varying classifications known as DDRAM and DDRAM 2. The starting of DDRAM comes with 260 MHz and ranges to 400 MHz in today’s market

You can check compatibility at http://support.intel.com/support/motherboards/desktop
for intel boards before going for purchase.

Upgrading RAM many times conflicts on parallel working of your older chip. In that case there is a possibility that you need to run only one of them.

Permalink Leave a Comment

Exclude Term From Google Search

October 6, 2007 at 5:20 am (General, Google, Tips n Tricks)

If you want to exclude any term from google search just add “” sign in front of that. Eg. keyboard design -interfacing

Similarly, if there is a need to force any term use “+“. Terms like “the”, “is” etc. which are common are excluded from search query for getting optimum results. So, this thing does the job.

Note: There is no space between operator and term..

Permalink 1 Comment

Google Indic Transliteration

October 5, 2007 at 2:37 am (Google)

untitled3.JPGClick to get a larger view

Disgusted of remembering the keys for hindi typing ? Try out this exciting new feature of indic translation by google labs which allows you to get the hindi text for similar sounding text in english. Eg. ram will be translated as राम. There are advanced options in case you want something else to be typed. All is visual and easy to use.

Site: http://www.google.com/transliterate/indic/

Permalink 3 Comments

Kill/Block Ads Using Hosts File

October 4, 2007 at 8:00 am (General, Operating Systems, Tips n Tricks)

I know its annoying to face ads everywhere along the web pages. Here is a way to get par from it.

Hosts File: This is file which does the job of DNS for the host. example 127.0.0.1 is termed as localhost. This entry is there in the host file. You can find the host file at C:\WINDOWS\system32\drivers\etc\ This hosts file has an entry like

127.0.0.1 localhost

Online Ads : There are hardly any sites who place their own ads. Instead they take ads from a different ad server. The trick is to block the ip address of the ad server.

Trick : The trick is to make an entry of the ad server in the hosts file. And the ip corresponding to it will be the local loopback ip address. i.e. 127.0.0.1 Now, whenever request for the adserver is fired then the entry in the hosts file is checked first. Which checks loopback address(127.0.0.1 that return nothing).

Eg. I tried this for a site named http://www.vyomworld.com/

Before Removing

Watch out the ads on the top posted by google server. Right click on any of them and go for copy link option in the popup.

When pasted we get the link location as http://pagead2.googlesyndication.com/pagead/ads?client=ca-pub-4686307991865625&dt=1191484186718&lmt=1191484162&format=fp_al_lp&output=html&correlator=1191484186703&channel=0656107910&url=http%3A%2F%2Fwww.vyomworld.com%2F&cc=27&ga_vid=1692318819.1191484187&ga_sid=1191484187&ga_hid=1737865425&flash=0&u_h=600&u_w=800&u_ah=570&u_aw=800&u_cd=32&u_tz=330&u_his=1&u_java=true&u_nplug=14&u_nmime=52&kw_type=radlink&prev_fmts=728x15_0ads_al_s&rt=ChBHBJp5AA8pqAp6TA-renBrEgpTYW1wbGUgR1JFGggc7Nd7YCYnvCDm76gQKAFI5u-oEA&hl=en&kw0=Sample+GRE&kw1=Barron%27s+GRE&kw2=GRE+Application&kw3=GRE+Dates&kw4=GRE+Material&okw=Sample+GRE

So, make an entry in the hosts file and it looked as

127.0.0.1 localhost
127.0.0.1 pagead2.googlesyndication.com

Now, restart the browser and try the site again this is what I got.. 🙂

After Updating

Permalink Leave a Comment

Remove Shutdown Option From Start Menu

October 3, 2007 at 2:31 am (Operating Systems, Tips n Tricks)

Wanna play with your friends by removing the shutdown option from the start menu in their computer ? Here is the key to the registry hack…

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer

“NoClose”=”DWORD:1” 

Note: It works only on windows

Permalink Leave a Comment

Encrypting Files In Windows XP

October 2, 2007 at 2:49 am (Operating Systems, Security)

Windows XP supports an asymmetric key encryption which is collaborated with the working of NTFS file system. This makes the process of encryption extremely efficient and transparent.

The file/ folder is encrypted using public key and can be opened with only private key of the same pair. Since, user is not taken as aware of these techniques, the process is made transparent to user. Where keys are made automatically and encryption and decryption happens on simple key. There is absolutely no need to maintain keys.

You may think if I dont remember key than what is the use of encrypting… The answer is the file will not be available to any other instance of the operating system. This is good when you are on a network.

Procedure

Goto the folder you want to encrypt and make a right click.

Go to properties and select Advanced from General tab.

There is a check box asking for encryption process, check it.

The color of your folder will be changed if it is done.

Permalink Leave a Comment

Google Advanced Operator Search

October 1, 2007 at 5:59 am (Google, Tips n Tricks)

Google allows the use of certain operators to help refine searches. The use of advanced operators is very simple as long as attention is given to the syntax. The basic format is:

operator:search_term

Notice that there is no space between the operator, the colon and the search term. If a space is used after a colon, Google will display an error message. If a space is used before the colon, Google will use your intended operator as a search term.

Operator

Description

Additional Argument Required ?

Site:

Find search term only on a site specified bu search_item

Yes

Filetype:

Search documents of type search_term

Yes

Link:

Find sites containing search_term as a link

No

Cache:

Display the cached version of page specified by search term

No

Intitle:

Find sites containing search_term in the title of a page

No

Inurl:

Find sites containing serach_term in the URL of the page

No

site: find web pages on a specific web site

This is discussed in one of the previous blogs. Anyways, this makes the search site specific.

Eg. site:wordpress.com harsh maheshwari

filetype: search only within files of a specific type

filetype:pdf Cache Memory

The current list of files that Google can search is listed in the filetype FAQ located at  http://www.google.com/help/faq_filetypes.htm. As of this writing, Google can search within the following file types:

• Adobe Portable Document Format (pdf)
• Adobe PostScript (ps)
• Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku)
• Lotus WordPro (lwp)
• MacWrite (mw)
• Microsoft Excel (xls)
• Microsoft PowerPoint (ppt)
• Microsoft Word (doc)
• Microsoft Works (wks, wps, wdb)
• Microsoft Write (wri)
• Rich Text Format (rtf)
• Text (ans, txt)

 link: search within links

To track out the connections this kind of searches are really cool. The following query displays every web page having http://www.apple.com as a link in it.

link:www.apple.com

Cache: display Google’s cached version of a page

Following search gives the cached version of the site. “Cache page not found error” is thrown in case the pages are not available.

cache:www.mitmhostelers.com 

Intitle: search within the title of the document

Searches within the title of the page which is displayed at the top of the bar.

intitle:Tech Bytes

inurl: search within the URL of a page

This operator restricts the search only within a URL, or a web address of a document. This operator requires no other search arguments

inurl:computers2007

This query would display pages with the word ‘computers2007’ inside the web address. One returned result will be the title of this blog.

So friends, try the stuff and make efficient searches as per requirements 🙂


Permalink Leave a Comment