Sign in to follow this  
Followers 0
Scylla.bx

How to spoof mac address of g300 wifi?

11 posts in this topic

Hi,

I'm a french user of g300 device, so please excuse me for my bad english...

I just want to spoof my wifi mac address. i've install 'busybox' and 'Mac address ghost'. The app tells me it's ok but does no change.

I'm not sure of what i'm doing, but on google "mac address ghost" is one of the most app used for this (or terminal and commands line but it's same as the app apparently)

So...someone can help me?

I'm on G300 8815, Cyanogen 4.2.2 R2, busybox 1.2.1.0

other question: how to be sure busybox is correctly installed?

0

Share this post


Link to post
Share on other sites

To check for busybox, download busybox from the Play Store. I'm not sure about the mac address spoofing.

0

Share this post


Link to post
Share on other sites

To check for busybox, download busybox from the Play Store. I'm not sure about the mac address spoofing.

that's what I did. and on app i do the installation of applet, so it should be good.

other important thing: daz have updated the wifi driver on 4.2.2...so maybe this one is not fully compatible...

Please someone can do test on other custom rom?

0

Share this post


Link to post
Share on other sites

I know this is probably not relevant, but I saw a news article about a thing called a pwntab or something like that, and it is a nexus 7 flashed with a ROM full of hacking and network penetration tools. This ROM is open source I think, so somebody might be able to get it working on the G300

Here are some links that I found for it:

http://adf.ly/JoKMx

http://adf.ly/JoKN6

http://adf.ly/JoKV3

0

Share this post


Link to post
Share on other sites

I know this is probably not relevant, but I saw a news article about a thing called a pwntab or something like that, and it is a nexus 7 flashed with a ROM full of hacking and network penetration tools. This ROM is open source I think, so somebody might be able to get it working on the G300

Here are some links that I found for it:

http://adf.ly/JoKMx

http://adf.ly/JoKN6

http://adf.ly/JoKV3

thanks for reply but i'm don't attempt to hack a network. I just want to spoof my mac address for bypass some restriction in my family network...

0

Share this post


Link to post
Share on other sites

thanks for reply but i'm don't attempt to hack a network. I just want to spoof my mac address for bypass some restriction in my family network...

I don't know about Mac's but on windows you use to be able to bypass child controlls e.t.c by simply adding an "s" after hhtp to hhtps:/ not done it since college days so not sure if it does anything now.

You probably know this one though as everyone at college did. J

0

Share this post


Link to post
Share on other sites

I don't know about Mac's but on windows you use to be able to bypass child controlls e.t.c by simply adding an "s" after hhtp to hhtps:/ not done it since college days so not sure if it does anything now.

You probably know this one though as everyone at college did. J

thank's but i'm talking about the mac address of my android device! nothing to see with macintosh or windows...

The mac address is the ID of your hardware wifi, and on my laptop running ubuntu i can change it ( in fact it's override the true address with everything you want).

The command line to do this is exactly the same on android, but nothing happening...

0

Share this post


Link to post
Share on other sites

Already done so. The application seems to work but still the mac address remains the same

0

Share this post


Link to post
Share on other sites

Huawei get the device's MAC address via a remote API call to the radio. In stock ROMs, I believe it's handled in libhardware_legacy. Since that's tricky for us to do with CM (as we can't add to what it links with without *gasp* editing the source tree), we have a custom binary to handle the getting and setting of the address in a similar way, and it's saved in the property wlan.module.mac_param to be read by libhardware_legacy when it loads the Wi-Fi module. It passes the address to the module as a parameter. The module is otherwise dumb, it uses the address it's given, or it uses the dummy developer one.

The safest way to run the binary is when the module's state is "loading", which is what currently happens. You probably can't override the value as it'll be overwritten by the binary just before the module gets loaded.

Providing stock ROMs work how I think they do, any difficulties shouldn't be specific to CM. I have no idea how the spoofing apps work anyway - devices always have these quirks when it comes to MAC addresses.

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

MoDaCo is part of the MoDaCo.network, © Paul O'Brien 2002-2016. MoDaCo uses IntelliTxt technology.