Network Security Implications of Host Models

This blog post is about a concept in network stacks called “Host Model” and its implications on network security. It is important for both, the offensive and the defensive side to know the differences between the host model paradigms and to be aware of the defaults that are used in common operating systems. In this blog post the following 2 hosts will be considered: Host A eth0 IPv4 address: MAC: 00:0C:29:6D:57:01 eth1 IPv4 Address: 10. … »

How to permanently change a MAC address using ethtool

Changing the MAC address of a network interface can be a common task if you either change addresses for privacy reasons or if you're performing security assessments. If you're using a Linux-based operating system, this can be done using one of the following commands: ifconfig eth0 hw ether xx:xx:xx:xx:xx:xx macchanger-ng --mac xx:xx:xx:xx:xx:xx eth0 ip link set eth0 address xx:xx:xx:xx:xx:xx While these changes are only temporary, it's also possible to instruct the operating system to set the MAC address straight after booting, for example by modifying files like /etc/network/interfaces. … »