Recommended Posts

/offtopic

This is why MAC address filtering is not considered a "security" method. It only limits you from accessing your own network. Hackers can get by it just fine"

/offtopic

The MAC address for any device should be on the device itself. There's a sticker there or should be. If not then you can easliy just disable MAC address filtering and then connect the printer, after that just check the DHCP and see it's MAC, copy it then turn it back on and put in the copied info.

agreed -- mac filtering is completely pointless as a security method. If you wanting to use it to "control" say when your kids machines can use the network with a schedule or something that is fine. But as a security measure its just causing you grief.

I would suggest how you fix your issue is disable it -- it has no security value at all!!

What printer? As stated the mac should be on there somewhere. But yeah the disable and let it get a IP from your dhcp server is very simple way to find it.

  Quote
greed -- mac filtering is completely pointless as a security method

Simply filters 'intruders' by a physical adress; how can an invalid MAC connect bypassing these rules?

  Quote
I would suggest how you fix your issue is disable it -- it has no security value at all!!

Did that :|

  Quote
What printer? As stated the mac should be on there somewhere. But yeah the disable and let it get a IP from your dhcp server is very simple way to find it.

Canon Mp495.

  On 27/10/2011 at 09:06, Cosmin said:

Simply filters 'intruders' by a physical adress; how can an invalid MAC connect bypassing these rules?

If someone wants to get in they'll just scan the packets passing by and then clone that MAC adress (aka fake it on their PC). Not hard at all.

  On 27/10/2011 at 09:24, Ambroos said:

If someone wants to get in they'll just scan the packets passing by and then clone that MAC adress (aka fake it on their PC). Not hard at all.

This. MAC Spoofing is a no-brainer, and would be the first thing any clueless hacker would do anyway.

A good password on a WPA2-secured network is about the only thing you need to protect your network.

Ok -- not going to go into the actual details.. Might be against rules to actually show you the actual steps. And any 8 year old can google for the instructions

But here -- see the MACs of the clients

post-14624-0-42202000-1319721253.jpg

Simple command to change your mac -- this would take all of 3.2 seconds for even the most clueless script kiddie following a guide to do. Found that above image from a simple how to ;) The tools out there will show you what station a client is connected to, etc. So you know what mac to use to access a specific AP.

Mac filtering is a method of control - its not a valid security feature. Since it takes 2 seconds to see the mac, and then spoof the mac.

To secure your wireless network use WPA2 and a SECURE PSK!! Mac filtering really is just going to make it harder for you to join your own wireless network. If that is what you want, then ok -- but its not a valid security method to be honest.

  • Like 1
  • 3 weeks later...
This topic is now closed to further replies.