MAC Address filtering is included in all modern routers and access points. Normally you would think this is a secure way of stopping people connecting to your network?
Using Kali Linux and the Aircrack/Airomon suite it only takes a few second to get around this. Start by launching the airodump utility to see wireless networks in range:
airmon-ng start wlan0
airodump-ng bssid TARGET_MAC_ADDRESS –i wlan0mon
Replace the above TARGET_MAC_ADDRESS with the actual MAC address of the target router. The way this bypass works is that you are looking for another connected client to this network; if you see a client that is authenticated with the network, then you’ve found a valid MAC address that’s allowed.
Once you see a connected client to this network, copy the clients MAC address and change your system to use this address:
airmon-ng stop wlan0mon
ifconfig wlan0 down
macchanger -m CLIENT_MAC_ADDRESS wlan0
ifconfig wlan0 up
Replace the above CLIENT_MAC_ADDRESS with a real MAC address that is connected to the network.
Using this method should bypass the filtering on the router/AP.