Explore >> Select a destination


You are here

sam.hooke.me
| | www.mjt.me.uk
3.1 parsecs away

Travel
| |
| | blog.gnoack.org
4.3 parsecs away

Travel
| |
| | willhaley.com
2.9 parsecs away

Travel
| | For all of these options first install macchanger. sudo DEBIAN_FRONTEND=noninteractive apt install macchanger Random MAC for every NIC Create a file at /etc/udev/rules.d/81-mac-spoof.rules like so. ACTION=="add", SUBSYSTEM=="net", RUN+="/usr/bin/macchanger -r $name" Random MAC for a specific NIC If the original MAC address of the NIC was dc:a6:32:d0:7b:de then create a file at /etc/udev/rules.d/81-mac-spoof.rules like so. ACTION=="add", SUBSYSTEM=="net", ATTR{address}=="dc:a6:32:d0:7b:de", RUN+="/usr/bin/macchanger -r $name" Notes https://wiki.archlinux.org/title/MAC_address_spoofing
| | blog.quarkslab.com
20.8 parsecs away

Travel
| [AI summary] The provided text discusses the use of Linux namespaces to isolate network stacks, enabling the creation of isolated environments for processes. It covers topics such as network namespaces, virtual interfaces, bridges, and iptables rules to enable communication between namespaces and the outside world. The text also touches on other namespaces like USER, MNT, UTS, IPC, and CGROUP, and references various resources for further reading.