The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    What is Wi-Fi MAC address?

    Discussion in 'Smartphones and Tablets' started by kenny1999, Sep 19, 2016.

  1. kenny1999

    kenny1999 Notebook Evangelist

    Reputations:
    26
    Messages:
    359
    Likes Received:
    28
    Trophy Points:
    41
    what is this?
    is it one of the parameter that identifies and distinguishes your mobile device?

    Can I change this value?
     
  2. HTWingNut

    HTWingNut Potato

    Reputations:
    21,580
    Messages:
    35,370
    Likes Received:
    9,877
    Trophy Points:
    931
    Yes it is a unique identification for your wireless device. It can't be changed. You can spoof it perhaps, but not change it.
     
  3. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,134
    Trophy Points:
    681
    ^ What WingNut said. However, I'll add that your wired connection (Ethernet) will also have a MAC address (which is different from your WiFi's MAC address since they're different physical devices).

    You *could* spoof your MAC address if you want, but there's not much practical value in that.
     
  4. Mitlov

    Mitlov Shiny

    Reputations:
    2,681
    Messages:
    5,689
    Likes Received:
    909
    Trophy Points:
    281
    As for what it is in practical terms, my workplace has employee-only Wi-Fi that you can't connect to unless the IT department has added your MAC address to the system. Wi-Fi passwords can be leaked to the general public. This is a more effective way of keeping the employee Wi-Fi for employees only.
     
  5. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,134
    Trophy Points:
    681
    One of the possible problems with MAC "security" though is that you have to ask; what stops me from sitting in the parking lot of your office with Wireshark on my computer, collecting all those approved MAC addresses? ;).
     
    bennni likes this.
  6. katalin_2003

    katalin_2003 NBR Spectre Super Moderator

    Reputations:
    14,963
    Messages:
    5,671
    Likes Received:
    1,521
    Trophy Points:
    331
    Exactly, this should not be considered a security feature. An attack as Jarhead described takes less than 15 seconds with minimal tools and no physical access to any hardware.
     
    toughasnails and bennni like this.
  7. Krowe

    Krowe Notebook Evangelist

    Reputations:
    88
    Messages:
    694
    Likes Received:
    327
    Trophy Points:
    76
    lol, and that's why we have user specific login credentials + security token...
     
  8. Mitlov

    Mitlov Shiny

    Reputations:
    2,681
    Messages:
    5,689
    Likes Received:
    909
    Trophy Points:
    281
    To clarify, having an approved MAC address does not give you access to any of the employer servers or documents, just access to an internet connection. I can only access the employer servers and documents on my employer-supplied desktop with a username and password. The wifi connection I'm talking about just allows employees to stream music, send and receive emails, etc without using their mobile data plan.
     
    Jarhead likes this.
  9. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,134
    Trophy Points:
    681
    Yeah, I was expecting that your company wouldn't rely on MAC filtering for accessing sensitive stuff. Though even then, you could still use that as a stepping stone for another attack (for example: connect to AP with spoofed MAC and other login requirements, spoof well-used service, commit man-in-the-middle attacks).

    Point of that post was that MAC filtering isn't actually a useful security tactic, especially by itself.