How can someone spoof a MAC address?
by lucmove from LinuxQuestions.org on (#5QS57)
Or rather: How can someone spoof -the right- MAC address?
I've been reading some discussions where people keep repeating that MAC filtering in access point security is delusional because MAC addresses are easy to spoof and anyone who uses it is just fooling themselves.
Yes, I understand that they are easy to spoof, but what none of those people ever mention is... how in the world is the attacker supposed to guess -what- MAC addresses are in the list of authorized MAC addresses?
I've been reading some discussions where people keep repeating that MAC filtering in access point security is delusional because MAC addresses are easy to spoof and anyone who uses it is just fooling themselves.
Yes, I understand that they are easy to spoof, but what none of those people ever mention is... how in the world is the attacker supposed to guess -what- MAC addresses are in the list of authorized MAC addresses?