Change MAC Address To Bypass Network Usage Restrictions With DynaMAC

MAC address, also known as Physical address of a system, assist network administrators to identify clients connected in LAN environment. Changing MAC address of (NIC) Network Interface Controller may come useful in situations where system admins filter out clients by their NICs MAC addresses instead of system IPs. For instance, if an extra security layer is added to the LAN network, system admins may easily identify unauthorized users by reading their MAC addresses even if they have already spoofed their IPs in order to gain access to one specific network group. To prevent this, you might need to change your physical address of NIC card. Moreover, some servers restrict their service usage by identifying periodic requests from same client, i.e same physical address of NIC card. In such a situation, DynaMAC can come useful to quickly bypass restrictions imposed by network admins and website owners to gain access to network and use online services.

It’s an application for Windows which allows changing MAC address of your NIC card. Unlike other similar tools, it lets user enter the MAC address manually rather than replacing the default MAC address with auto-generated one.

First off, select the network adapter from the list whose MAC address is to be changed. Once specified, it will show the default Physical Address underneath the drop-down list.


set MAC 2

In Desired Physical Address section, enter the new MAC address and click Set MAC. Now either restart your system or reset selected adapter by disabling and then enabling it from Network Connection window. Once done, open Network Connection Details window to verify newly applied MAC address. To restore the default MAC address, hit Reset MAC on DynaMAC main screen. It is an open source application that works on Windows XP/Vista/7.

Download DynaMAC

Advertisement
  • GNU

    TMAC is also free and has got more features. Changing the MAC like this dynamac thing does can be done from within the control panel for many wlan adapters.

  • GNU
  • Rinay

    The easiest way to change MAC address without downloading any software is to go to device manager and open properties of your network adapter in advance tab there should be option of “network address”, “MAC address”, “physical address” or something similar option, there your can put your own value and pressing ok will restart your adapter and change the mac address. Note: this option is available for most modern adapter/driver. If that option is not available then i guess software based mac changer could work.

  • Gregg DesElms

    Any network of which I have been in charge, be it as its actual owner’s IT Director, or be it as a volunteer administrator for a non-profit organization… no matter… I have always insisted, as a condition of my performing the service of operating the network, that every single user sign a Terms of Service (TOS) agreement which would allow for them getting a single warning if caught using tools like this; and permanently barring them from the network upon being caught a second time. Of course, shame on me if I had not sufficiently locked-down and restricted both their workstation and their login such that they could not, in any case, download and either install or run such tools as this; or such that they could get to any of the areas of either the workstation or the network which would allow them to make systemic changes, change their permissions or access, or do anything else which regular end-users should not do.

    In situations wherein the end-user could no longer do his/her job because s/he had no access to the company’s network, that presented a huge problem… and helped the employer to drive home the point that the computer on which s/he worked, and the network to which it was connected did not belong to him/her; and that if s/he wanted to use such tools as this, then s/he could do it on his/her own computer, at home, or anywhere OTHER than at work. At that point, we would allow the user to have access again; but with the understanding that if there was a third incident, their employment would be terminated.

    Same thing with college/university networks: Third time, and you’re out… expelled.

    Indeed, some employers, and colleges/universities in my 35 year career did not have the courage to strictly enforce such policies; and whenever that was the case, I always — 100% of the time — left (or never took the job in the first place). I cannot and will not manage a network that is not sufficiently secure so that I must have twice the IT staff that would normally be necessary just to undo all the things that end-users do which goofs-up the network, or increases the number of end-user support requests.

    Using tools and/or methods to usurp security and access control, or blocked web sites, or anything else which a given IT department (or the owner/operator of a network) has in place is no small thing. End-users always think it’s no big deal; or that it’s a challenge, like a game. But it’s a very serious matter; and in a few states where the hacker laws are particularly well- and deftly-written, it can even be a crime… as it should be.

    End-users of other people’s networks — whether or not also on other people’s machines — need to respect whatever are its either declared or configured (or both) limitations. It’s not their network. They need to respect its owner/operator’s wishes. It’s a matter of both law and ethics.

    Or do those things no longer matter.

    _______________________________
    Gregg L. DesElms
    Napa, California USA
    gregg at greggdeselms dot com

    • Cetin Sert

      I prefer to call your bunch ‘lazy lesser network admins’. I would like you to know that at all the places I have worked and in all systems I have come to administer I have always implemented and encouraged flexibility – which I am really glad to see and say has seen acceptance and respect from administrators of higher kind at established research institutes and networks.

      Admins should not deem themselves equal to some form of oppresive absolute force and remember that they are there to serve their community, schools, universities and coworkers.

  • jasray

    Yes, but how are you going to join Active Directory? For that the Administrator password will be needed, so stuck again. If the security is correctly set, spoofing IPs or MACs is a waste of time if wanting to bypass a restriction. One must go deeper into the system.

  • attention

    beware. dynamac seems to be a downloader that downloads a backdoor trojan.