Monday 3 November 2014

Spoofing MAC filters and Captive Portals on Public Wifi Networks

Spoofing MAC filters and Captive Portals on Public WiFi Networks

MAC filters are implemented on the networks to white-list particular devices and restrict access to the access point. At many public internet access points, a Captive Portal service is used to authenticate users. But what this service does to maintain that session is track MAC addresses of the authorised devices. As MAC filters are not inherently implemented in WiFi 802.11 standards, spoofing the captive portals through masked or spoofed MAC addresses is fairly easy. Here is how..