What is MAC spoofing in a router

Spoofing

  • In network technology, spoofing is a technique for reducing bandwidth requirements in internetworking. With this technology, the network overhead is reduced and thereby the costs for transmission over wide area networks as well as the network utilization are lowered. Spoofing reduces cyclically sent messages, such as network management information, in that a router works as a proxy and replies for a connected remote device. As a result of the spoofing, for example, a connection appears to the LAN device as still existing, although it has already been terminated. In the case of wide area connections, this has the advantage that a connection can be terminated after a certain period of time if there is no user data, although it would normally have to be maintained by the cyclical management data packets.


  • In Internet terminology, spoofing has a meaning of its own, namely giving a wrong address. The wrong internet address makes someone pretend to be an authorized user. Measures against spoofing that prevent the misuse of IP addresses are called anti-spoofing. There is IP spoofing, DNS spoofing, WWW spoofing, address spoofing and ARP spoofing, which function with a simulated IP address based on the host address or the domain name or with the assignment between IP and hardware address.

  • Another spoofing technique that should be mentioned is MAC address spoofing or MAC spoofing. This technology is about the MAC address set by the manufacturer on the network card, which normally cannot be changed. However, there are tools that simulate a different MAC address to the operating system. As a result, the identity of the computer changes.

  • Another type of spoofing is email spoofing. The header is exchanged with the email address, giving the impression that the email was sent by a different sender. This technique is used by spammers to send spam and to induce the recipient of the spam to take action, for example to open an attachment. Mail spoofing is made easier by the Simple Mail Transfer Protocol (SMTP), which is used to transfer most mail, because it does not have an authentication mechanism.

  • Spoofing, the concealment or manipulation of one's own identity, is also used in mobile communications, namely as SMS spoofing. Your own sender data is replaced by fake names, jokes, numbers or idiosyncratic imitations such as "Chancellor" or "Pope". The goals of SMS spoofing can be varied, some are about fun, others about fraud and the determination of secret account or identity numbers, and still others about sending viruses.

    The use of the short message service (SMS) with faked identities is a criminal offense in some countries.