Spoofing your identity on a network
Ethical hackers commonly use the same Tactics, Techniques, and Procedures (TTPs) as real adversaries and threat actors, with the intention of efficiently discovering hidden security vulnerabilities on a target’s systems and network before a real hacker is able to discover and exploit them. A common technique used during ethical hacking, penetration testing, and red teaming is concealing your identity by spoofing your device’s IP address and Media Access Control (MAC) address.
A device can be assigned an IP address via a Dynamic Host Configuration Protocol (DHCP) server on a network or statically assigned by a user. Any of these methods allow an IP address to be assigned to the device’s Network Interface Card (NIC). There’s a unique 48-bit hexadecimal MAC address that’s embedded into the firmware of the network adapter by its manufacturer. Whenever a device sends a frame (message) on a network, the source MAC...