Jump to content

How to spoof mac address of g300 wifi?


Guest Scylla.bx

Recommended Posts

Guest Scylla.bx

Hi,

I'm a french user of g300 device, so please excuse me for my bad english...

I just want to spoof my wifi mac address. i've install 'busybox' and 'Mac address ghost'. The app tells me it's ok but does no change.

I'm not sure of what i'm doing, but on google "mac address ghost" is one of the most app used for this (or terminal and commands line but it's same as the app apparently)

So...someone can help me?

I'm on G300 8815, Cyanogen 4.2.2 R2, busybox 1.2.1.0

other question: how to be sure busybox is correctly installed?

Link to comment
Share on other sites

Guest Scylla.bx

To check for busybox, download busybox from the Play Store. I'm not sure about the mac address spoofing.

that's what I did. and on app i do the installation of applet, so it should be good.

other important thing: daz have updated the wifi driver on 4.2.2...so maybe this one is not fully compatible...

Please someone can do test on other custom rom?

Link to comment
Share on other sites

Guest george109

I know this is probably not relevant, but I saw a news article about a thing called a pwntab or something like that, and it is a nexus 7 flashed with a ROM full of hacking and network penetration tools. This ROM is open source I think, so somebody might be able to get it working on the G300

Here are some links that I found for it:

http://adf.ly/JoKMx

http://adf.ly/JoKN6

http://adf.ly/JoKV3

Link to comment
Share on other sites

Guest Scylla.bx

I know this is probably not relevant, but I saw a news article about a thing called a pwntab or something like that, and it is a nexus 7 flashed with a ROM full of hacking and network penetration tools. This ROM is open source I think, so somebody might be able to get it working on the G300

Here are some links that I found for it:

http://adf.ly/JoKMx

http://adf.ly/JoKN6

http://adf.ly/JoKV3

thanks for reply but i'm don't attempt to hack a network. I just want to spoof my mac address for bypass some restriction in my family network...

Link to comment
Share on other sites

Guest bladebuddy

thanks for reply but i'm don't attempt to hack a network. I just want to spoof my mac address for bypass some restriction in my family network...

I don't know about Mac's but on windows you use to be able to bypass child controlls e.t.c by simply adding an "s" after hhtp to hhtps:/ not done it since college days so not sure if it does anything now.

You probably know this one though as everyone at college did. J

Link to comment
Share on other sites

Guest Scylla.bx

I don't know about Mac's but on windows you use to be able to bypass child controlls e.t.c by simply adding an "s" after hhtp to hhtps:/ not done it since college days so not sure if it does anything now.

You probably know this one though as everyone at college did. J

thank's but i'm talking about the mac address of my android device! nothing to see with macintosh or windows...

The mac address is the ID of your hardware wifi, and on my laptop running ubuntu i can change it ( in fact it's override the true address with everything you want).

The command line to do this is exactly the same on android, but nothing happening...

Link to comment
Share on other sites

Guest Dazzozo

Huawei get the device's MAC address via a remote API call to the radio. In stock ROMs, I believe it's handled in libhardware_legacy. Since that's tricky for us to do with CM (as we can't add to what it links with without *gasp* editing the source tree), we have a custom binary to handle the getting and setting of the address in a similar way, and it's saved in the property wlan.module.mac_param to be read by libhardware_legacy when it loads the Wi-Fi module. It passes the address to the module as a parameter. The module is otherwise dumb, it uses the address it's given, or it uses the dummy developer one.

The safest way to run the binary is when the module's state is "loading", which is what currently happens. You probably can't override the value as it'll be overwritten by the binary just before the module gets loaded.

Providing stock ROMs work how I think they do, any difficulties shouldn't be specific to CM. I have no idea how the spoofing apps work anyway - devices always have these quirks when it comes to MAC addresses.

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.