This tool can be used in conjunction with other red-team tactics to evade MAC address filtering by standard firewall configurations.
A couple example firewalls that use MAC Address filtering are in the links below:
- Will allow the generation of a random MAC address
- Will allow the generation of a manually created MAC address
- Will allow for the '-h or --help' flag to be provided for more information
- This tool expects two arguments:
- '-i or --interface' with default interface (e.g. eth0)
- '-r or --random' with option 'random' OR '-s or --static' with manual MAC (e.g. 00:11:22:33:44:55)
- To use the default functionality of this tool, no additional libraries or modules are needed
- This tool needs a
Python interpreter, v3.6 or higher due to string interpolation
- This was designed in its current state to work with a Linux OS. However if desired it can be altered to fit a Windows OS, the subprocess calls will need to change
- I wrote this with Python 2.7 capabilities as well, I commented out that code to avoid errors running in Python3
rootdir:.
│ .gitignore
│ errors.py
│ LICENSE
│ mac_changer.py
│ README.md
Run the binary or standalone exe and pass the '-h or --help flag'.
Run the binary or standalone exe and pass the '-r or --random flag'.
Run the binary or standalone exe and pass the '-s or --static flag'.