Notifications
Clear all
Topic starter 16/08/2025 11:03 pm
Let’s unpack how MAC address vendor name reconnaissance works and why it’s useful in computer networking and cybersecurity.
🧭 What Is a MAC Address?
A MAC (Media Access Control) address is a unique identifier assigned to a network interface card (NIC). It’s used for communication within a local network (Layer 2 of the OSI model).
- Format:
XX:XX:XX:YY:YY:YY
- First half (
XX:XX:XX
) is the Organizationally Unique Identifier (OUI)—assigned to the manufacturer - Second half (
YY:YY:YY
) is device-specific
🕵️♂️ What Is MAC Address Vendor Reconnaissance?
MAC vendor reconnaissance is the process of identifying the manufacturer of a device based on its MAC address. This can reveal:
- Device type (e.g., Apple, Samsung, Cisco)
- Network inventory details
- Potential targets for exploitation or monitoring
🔍 How It Works
Step-by-Step:
- Capture MAC addresses:
- Use tools like Wireshark, Nmap, or
arp -a
to list devices on a network
- Use tools like Wireshark, Nmap, or
- Extract the OUI:
- Take the first 3 bytes of the MAC address
- Look up the vendor:
- Use an OUI database (public or local) to match the prefix to a manufacturer
Example:
MAC: 00:1A:2B:4C:5D:6E
OUI: 00:1A:2B → Cisco Systems
🛠️ Tools for MAC Vendor Recon
Tool | Description |
---|---|
macchanger |
Change or spoof MAC addresses |
arp-scan |
Scan local network and identify MAC vendors |
Wireshark |
Capture packets and inspect MAC addresses |
Online databases | Sites like macvendors.com or IEEE OUI lookup |
Example with arp-scan
:
sudo arp-scan --localnet
Output:
192.168.1.10 00:1A:2B:4C:5D:6E Cisco Systems
🎯 Why It’s Useful
- Network auditing: Identify unauthorized or unknown devices
- Security monitoring: Spot rogue devices or spoofed MACs
- Penetration testing: Profile targets based on vendor (e.g., exploit known vulnerabilities in certain devices)
- IoT tracking: Detect smart devices by vendor signature
⚠️ Limitations & Considerations
- MAC addresses can be spoofed, so vendor info isn’t always reliable
- Only works on local networks (MACs aren’t visible across routers)
- Some devices use randomized MACs for privacy