Attacks & Threats
MAC Spoofing
Also known as: MAC address spoofing
Definition
Changing a network interface's hardware MAC address to impersonate another device, bypass MAC-based access controls, or evade tracking.
Examples
- Cloning the MAC of an authorised laptop to bypass MAC filtering on a Wi-Fi network.
- Resetting the Wi-Fi MAC to obtain new free-trial time on a captive portal.
Related terms
ARP Spoofing
A local-network attack that sends forged ARP messages to bind the attacker's MAC address to another host's IP, redirecting traffic through the attacker.
IP Spoofing
Forging the source IP address of network packets to impersonate another host, bypass filters, or amplify denial-of-service attacks.
Rogue Access Point
An unauthorised wireless access point connected to a network, either installed maliciously by an attacker or naively by an employee, that bypasses network security controls.
Evil Twin Attack
A Wi-Fi attack in which an adversary stands up a rogue access point that mimics a legitimate SSID, so victims connect to it and expose traffic or credentials.
Network Access Control (NAC)
Network Access Control (NAC) — definition coming soon.
IEEE 802.1X
IEEE 802.1X — definition coming soon.