[ / / / / / / / / / / / / / ] [ dir / ausneets / komica / marx / mde / trap / vg / vichan / x ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): a30361e8a220316⋯.gif (7.42 KB, 250x250, 1:1, osi.gif) (h) (u)

[–]

 No.1007574>>1008093 >>1008242 [Watch Thread][Show All Posts]

MAC address?

Are those baked into hardware or are they randomised like tokens?

Probe requests?

What exactly are they?

 No.1007582

Did you even try to investigate before posting this?


 No.1007583>>1007716

mac address it's the address of your mac computer


 No.1007588

>>>/4channel/g


 No.1007589

How can you know MAC but think posting here is a more efficient way to get basic info than reading the fucking kikepedia article or something?


 No.1007716>>1008834

File (hide): 9f12289ebc86a5c⋯.png (396.55 KB, 600x800, 3:4, 1439759638829.png) (h) (u)

>>1007583

This, Gentoo computers have a lin address


 No.1008049>>1008082

>that image

>L6

>In the Year of Our Lord Two Thousand and Eighteen

Lmao


 No.1008082>>1008083

>>1008049

You mean to say that the networking layer model is obsolete, pointless and meaningless?


 No.1008083>>1008101

>>1008082

I mean to say that no one fucking uses the presentation layer.


 No.1008093>>1008102

>>1007574 (OP)

>MAC address?

lol op is a macfag.


 No.1008101>>1008103

>>1008083

The presentation layer of the OSI model conceptually does have its distinct purposes such as file format/encoding, compression, encryption etc. It's just that in practice it'ss basically always handled by the same piece of software which also implements the application layer functionality.


 No.1008102>>1008133

>>1008093

Yup. Applel controls media access on all Ethernet hardware in the world.


 No.1008103

>>1008101

That's why practically the TCP/IP model is better as far as the top of the stack is concerned, as it bundles everything above transport together as "application layer", as that's how it almost always works in the real world.


 No.1008130>>1008219

>MAC address?

>Are those baked into hardware or are they randomised like tokens?

you can change them in software usually. they aren't randomized though, you have the same one forever unless you override it

>probe requests

you send a message asking to connect to a certain access point. everyone can read the message from the air. it has your mac and the name of the access point you want to connect to. if you've previously connected to 10 different APs, you will send probes to all of them whever you go. in wpa_supplicant you can turn this shit off. i dont know what other info is in wifi, probably tons, and tons of PII


 No.1008133>>1008185

>>1008102

Shit, am I safe if I don't use Ethernet?


 No.1008185>>1008190


 No.1008190

>>1008185

Nigger, so was I


 No.1008219

>>1008130

Fuck off here, we don't spoonfeed retards, you're not getting any pajeet points for this.


 No.1008242>>1008702

>>1007574 (OP)

All of it. Just don't use a router


 No.1008702>>1008707

>>1008242

Almost everything. Physical location of IP, system brand and specs (cancer JavaScript scripts), data being transmitted to and from server and client, etc. I'd encourage you to look more into ARP spoofing if you want to learn more about MAC addresses, ARP and high level MITM attacks.

The entire OSI model from layer 1 to 7 and all most of the protocols are susceptible to man-in-the-middle and spoofing attacks, etc. You have to remember that the OSI model was created and implmented decades ago when protocols that transmitted data in plaintext was the norm. The icing on the shit-sandwich is the modern day 'web development' languages like JS and PHP that can fingerprint you when you visit a site. Most of the protocols today have SSL/TLS bolted on, which works for the most part, but E2E would be more preferable for security and some anonymity if we lived in a perfect world, but we don't.


 No.1008707

>>1008702

I also forgot the mention that MAC addresses can easily be spoofed with tools like macchanger that can be used to bypass simple NAC systems or MAC address filtering with relative ease. This is how I usually bypass captive portals for free wifi by changing my MAC address to one that's already authenticated to the WAP after searching for one with the aircrack-ng suite.


 No.1008834

File (hide): 8a1a9d2c1d7b83f⋯.png (129.11 KB, 721x972, 721:972, elmpr58.png) (h) (u)

>>1007716

>not g+l address




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
21 replies | 2 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / ausneets / komica / marx / mde / trap / vg / vichan / x ][ watchlist ]