

Hackers use this method of attack to conceal their own identity and imitate another. Spoofing: in the network terminology, spoofing refers to the various methods which can be used to manipulate the fundamental address system in computer networks.The first 24 bits are the manufacturer code assigned by the Institute of Electrical and Electronics Engineers (IEEE), and the following 24 bits are the device number defined by the manufacturer. Every MAC address includes 48 bits, or 6 bytes, and is arranged in the following pattern: 00:81:41:fe:ad:7e. MAC addresses: distinct hardware addresses identify network interface controllers (NIC) such as LAN cards or WLAN adapters, and are used to identify devices in local networks.This masking is what’s referred to as MAC spoofing. But it is possible to mask it on the software side. Users are not able to change or rewrite the MAC address. This burned-in address (BIA) is virtually etched to the hardware by the manufacturer. Every device that’s connected to a network possesses a worldwide, unique, and physical identification number: the Media Access Control address, or MAC for short.
