Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "mac addresses"
-
Me: so, ifconfig, what is my gateway?
ifconfig: [ip address]
Me: nmap, what is this IP address?
nmap: it's a network switch with an open telnet port.
Me: what happens if I connect to it?
switch: WHAT IS THE PASSWORD?!?!
Me: is it blank?
switch: correct. what do you want to do?
Me: can I look at all the IP and MAC addresses on the network?
switch: WHAT IS THE ADMIN PASSWORD?!?!
Me: is it... admin?
switch: correct. Here's everyone that's connected to the network: [400+ IPs and MACs]
Me: ok python, would you filter through these and tell me what manufacturer each one belongs to?
python: sure.
[~50 manufacturer lookups later]
python: there's a bunch of apple product, a bunch of miscellaneous laptop and printer manufacturers, and some raspberry pis.
Me: raspberry pis?
python: yep. about 20 of them.
Me: What happens if I connect to one?
rpi: WHAT IS THE PASSWORD?!?!
Me: raspberry?
rpi: correct. what do you want to do?
Me: can I make you do my bidding in the background when you aren't being used?
rpi: sure, sounds fine.
I love ignorant sysadmins.8 -
The marketing department is right next door to my office, and to make room for their new intern, a very high end, large, and noisy printer was 'temporarily' placed in my office. I'm a reasonable person though, and didn't mind this. The salespeople figured out that it makes commercial grade printouts, so for their various presentations and whatnot, they'll print enormous numbers of pages on this thing, and basically use my office as a motherfucking water-cooler. After a few weeks of this, I logged into the printer from my computer, and set it to disallow all connections from MAC addresses other than those in the marketing department, who print far less material on their own, special, dedicated printer. Absolute fucking chaos ensued. Grown men were brought to tears, ultimatums were made, and blood was shed. The hardware guys were down here for over an hour, making up absolute bullshit as to why it wasn't working(which really surprised me).
Long story short, cut off access to printer, sit back and watch the true face of humanity emerge. Seriously, fuck those guys. They have their own goddamn printer.7 -
TL;DR: Don't ever interrupt me while taking a shit.
>be me taking a shit comfortably in the bathroom, not bothering anyone
>hear my cousin outside calling his gf
>nofsgiven.jpg
>suddenly stuff comes flying through the window and hear her gf laughing in his phone speaker
>stupid asshat was trying to make his gf laugh by bothering me while in the debug room
>scream from the top of my lungs for him to stop interrupting my defecation process
>stuff keeps coming from the window
>my brown creation comes back inside like a scared turtle
>pull up pantaloons
>get out of thinking room
>open up laptop, start ubuntu
>sudo apt-get install aircrack-ng
>enable monitor mode, get phone, ap mac addresses
>vim shittyvengeance.sh
>write small script that deauths his phone and then waits some seconds and then starts over again so he doesn't think it's me
>:wq and make script executable
>sleep 180; cowsay ding dong ur vengeance has arrived; sudo ./shittyvengeance.sh
>tuck into bed and close laptop before sleep time ends
>his call suddenly drops
>"Matt are you messing up with my WiFi again?"
>"Nah man. Not working for me either. Must be localcompany's problem."
>mfw he can't talk with his gf for more than 15 seconds before losing connection
>omgitworks.jpg
>figure that it was the most useful thing I had made in a pc in these two years at uni
>be proud of me for making a stupid script
>think about going back to my pearl white throne
>no longer wanting to drop my supplies
>go to sleep
>mfw forgot to wipe ass
My first story in devRant! Was lurking for quite a while and finally felt like sharing something 🙃24 -
"The school tech asked me for my MAC address on my phone, but I told them I didn't have one because my phone is Android and Macs only have MAC addresses, right?"
-my wife8 -
Everything has to have MAC-Addresses. EVERYTHING!
(yes, I know. That's not one. But similar)
(stolen from https://twitter.com/istar_nil/...) -
Windows, God damn you piece of fucking shit.
Why the fuck can't you make networking fucking easy like literally every other fucking operating system in the goddamn fucking world?
Why the fuck can't I spoof mac addresses so that I have the same IP address regardless of if I'm on a hard line or wireless?
Who in their fucking right mind thought that the pro version of Windows wouldn't need to do that?
I don't even like using you at this point, I'm forced to use you for work.
There's literally not enough explicitives that I can chain together to sufficiently convey how much I fucking hate you Microsoft. So enjoy this seizure inducing tourette's mode compilation.
Fuck shit cock piss mother fucker asshole bitch mother fucker sick and tired of your fucking shit Microsoft you fucking cuck piece of shit nobody fucking likes you they only have to use you because no fucking business in their right mind is going to spend the millions of dollars it cost to fucking switch over to fucking Mac or Linux I hope you fucking choking a bag of HIV riddled flaming dicks you fucking piece of shit.17 -
*Opens a pack of tablets (8000) and start to prep them.*
WHAT THE ACTUAL FUCK.
SAME MAC ADDRESS.
Okay, that's just an er-
NOPE, ANOTHER ONE. HOLY SHIT. OKAY IT'S GETTING WORSE.
Is it my db?
Oh.
The db is just fine.
*Painfully getting in contact with the reseller*
Me: grumbles grumbles Mac Address grumbles
Reseller: Uh.. What?
It would be okay if we weren't using Mac Addresses as primary key in our databases.
They gave us some weird-looking software to "re-write mac addresses". It's working.
Something tells me that ipv6 is not for tomorrow.7 -
A few years ago I was browsing Bash.org, and a user posted that he'd physically lost a machine.
A few weeks ago, I'd switched my router out for OPNSense. I figured it was time to start cleaning up my network.
Over the course of tracking down IP addresses and assigning statics to mac addresses, I spotted an IP I didn't recognize.
Being a home network, I'm pretty familiar with everything on the network by IP, so was a little taken aback.
I did some testing, found out that it was a Linux box. Cool.
I can SSH into it. Ok.
Logs show that it's running fine, no CPU/Memory/Harddrive issues. Nice.
So where is it?
Traceroute shows its connected directly to the router... Maybe over an unmanaged switch...
Hostname is "localhost"... That's no help.
I've walked the network 4 times now, and God knows where it is.
I think maybe I'll just leave it alone. If it ain't broke...9 -
"There's more to it"
This is something that has been bugging me for a long time now, so <rant>.
Yesterday in one of my chats in Telegram I had a question from someone wanting to make their laptop completely bulletproof privacy respecting, yada yada.. down to the MAC address being randomized. Now I am a networking guy.. or at least I like to think I am.
So I told him, routers must block any MAC addresses from leaking out. So the MAC address is only relevant inside of the network you're in. IPv6 changes this and there is network discovery involved with fandroids and cryphones where WiFi remains turned on as you leave the house (price of convenience amirite?) - but I'll get back to that later.
Now for a laptop MAC address randomization isn't exactly relevant yet I'd say.. at least in something other than Windows where your privacy is right out the window anyway. MAC randomization while Nadella does the whole assfuck, sign me up! /s
So let's assume Linux. No MAC randomization, not necessary, privacy respecting nonetheless. MAC addresses do not leak outside of the network in traditional IPv4 networking. So what would you be worried about inside the network? A hacker inside Starbucks? This is the question I asked him, and argued that if you don't trust the network (and with a public hotspot I personally don't) you shouldn't connect to it in the first place. And since I recall MAC randomization being discussed on the ISC's dhcp-users mailing list a few months ago (http://isc-dhcp-users.2343191.n4.nabble.com/...), I linked that in as well. These are the hardcore networking guys, on the forum of one of the granddaddies of the internet. They make BIND which pretty much everyone uses. It's the de facto standard DNS server out there.
The reply to all of this was simply to the "don't connect to it if you don't trust it" - I guess that's all the privacy nut could argue with. And here we get to the topic of this rant. The almighty rebuttal "there's more to it than that!1! HTTPS doesn't require trust anymore!1!"
... An encrypted connection to a website meaning that you could connect to just about any hostile network. Are you fucking retarded? Ever heard of SSL stripping? Yeah HSTS solves that but only a handful of websites use it and it doesn't scale up properly, since it's pretty much a hardcoded list in web browsers. And you know what? Yes "there's more to it"! There's more to networking than just web browsing. There's 65 THOUSAND ports available on both TCP and UDP, and there you go narrow your understanding of networking to just 2 of them - 80 and 443. Yes there's a lot more to it. But not exactly the kind of thing you're arguing about.
Enjoy your cheap-ass Xiaomeme phone where the "phone" part means phoning home to China, and raging about the Google apps on there. Then try to solve problems that aren't actually problems and pretty vital network components, just because it's an identifier.
</rant>
P.S. I do care a lot about privacy. My web and mail servers for example do not know where my visitors are coming from. All they see is some reverse proxies that they think is the whole internet. So yes I care about my own and others' privacy. But you know.. I'm old-fashioned. I like to solve problems with actual solutions.11 -
Watching a piece (a Belgian TV series) about hackers
- Police IT dpt takes a burned down computer (literally burned down -- black from the smoke), plug it into the mains and remove a graphics card. To collect evidence from.
- A policeman from IT dpt is browsing some company's website (while at the police station), looking at their clients. Address bar says: 127.0.0.1.
- The police hacker is browsing some forum. She got the post author's IP and MAC addresses from that forum post metainfo.
<img src="awkward.jpeg" alt="Awkward...">
<img src="confused_jackie.jpeg" alt="Awkward...">19 -
So I'm still new to programming. Mind blown every day learning python. Although self learning does get confusing sometimes. Somehow I'm learning pen testing now and already installed Kali on a virtual box. Pretty sure I aimed at making a multi platform mobile app to begin with.... Yep, from Kivy to changing Mac addresses, am I lost? Or this is the way to dive in?4
-
I recently upgraded my computer to a ryzen 1700x and 16gb 3600mhz memory and an asus rog crosshair hero vi board(From an 8350)
My pc ran soo smooth, games even more so
The games ran great, but my personal performance went down.
I didn't understand why. Im probably just losing my edge.
I trained and tried. But still, it felt off.
Today I realized that with my new motherboard, I got a new mac address. And my friend is a bit of a neat freak with that stuff. He has a whole system for ip addresses.
So i told him, I wont have the correct ip address. Then he started laughing and asked my to browse to a certain site www.privateinternetaccess.com
There at the top it said: "you are protected by pia"
Devices without an ip address bound to their mac address, will automatically use the vpn according to his rules.
My ping improved by 10-15ms upon getting my normal ip address back and my game performance is back.3 -
Ended up dong an internship for my school (not really internship, more along the lines of formal volunteering, but whatever) helping set up laptops for a statewide standardized assessment.
I made a program to log the machine's identifying info (Serial, MAC addresses, etc), renames it, joins it to the school's Active Directory, and takes notes on machines, which gets dumped into a csv file.
Made the classic rookie mistake of backing things up occasionally, but not often enough. Accidentally nuked the flash drive with the data on it, and spent a good while learning data recovery and how grep works.
Lesson Learned? Back up frequently and back up everything -
I need to tell you the story of my MOAB (Mother of all bugs).
I need to write some stuff in C (which i am fairly used to) and have a function that allocates memory for a Matrix on the heap. The matrix has a rows and columns property and an associated data array, so it looks like this
struct Matrix{
uint8_t rows;
uint8_t columns;
uint8_t data[];
}
I allocate rows*columns + 2 bytes of memory for it.
I also have a function to zero it out which does something like this
for(int i=0; i < rows*columns;i++){
data[i]=0;}
Let‘s come to the problem:
On my Mac the whole stuff works and passes all tests. We tried the code on a Linux machine and suddenly the code crashed in various places, sometimes a realloc got an invalid pointer, sometimes free got an invalid pointer and basically the code crashed at arbitrary points randomly.
I was confused af because did i really make THAT many errors?
I found out that all errors occured when testing my matrices so i looked more into it and observed it through the debugger.
Eventually i came to the function that zeroes out my matrix and it went unusually high and wondered if my matrix really was that big.
Then i saw it
The matrix wasn‘t initialised yet
It had arbitrary data that was previously in the heap.
It zeroed out a huge chunk of the heap space.
It literally wrote a zero to a shitload of addresses which invalidated many pointer.
You can imagine my facepalm2 -
I've spent probably 2-3 hours working on this MAC Address lookup script.
Only 100 lines and I think it's decently documented.
https://repl.it/@RiderExMachina/...
Of course, I made a really quick version in Batch within 5 minutes that works decently well, but I'm more proud of this version... -
Little help needed to understand this:
Rogue detector: An AP dedicates itself to detecting rogue devices by correlating
MAC addresses heard on the wired network with those heard over the air. Rogue
devices are those that appear on both networks.
1.How can the same MAC appear in both networks? 2.If it does, why does it mean its a rogue device?4 -
I was arguing with some folks regarding the fact that the switch is the one that stores mac addresses and they are telling me no, it's the computer that stores the mac addresses... anyone can respond to this?6