It's not unthinkable to identify the terminal using a specific MAC address on the local subnet based on the network properties itself. It makes little sense in practice but that doesn't stop TV shows and movies from "doing" it.Ī more realistic way of identifying the individual behind a specific MAC address would be to take into account the proximity element: MAC address are not carried beyond the local subnet boundary which means the capturing device and the defender's device must share a lot in common. So, it would be pretty much as hard as tracing back the owner of a car knowing only the serial number of it's tires. that is, if the part wasn't actually sold independently through a retail channel in which case it would be impossible to trace it. This is a single component of the connecting machine which means that to trace it back you'd have to first go to the component's manufacturer before going to the actual device manufacturer. Notwithstanding the fact that MAC addresses can easily be spoofed or changed (which means that your defender has bad opsec if they are using the default hardware MAC on the network), they are, at best, linked to a specific network card. Technically, it would be next to impossible to trace back a random MAC address to an individual.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |