similar to: Is it possible to assign or spoof a MAC address in Wine?

Displaying 20 results from an estimated 6000 matches similar to: "Is it possible to assign or spoof a MAC address in Wine?"

2011 Jul 09
1
Need help with Warcraft II BattleNet Edition and LAN play
Hello, I'm trying to get LAN play working with Warcraft II BNE. As many of you know, W2BNE is so old that LAN play is done through IPX networking. I realize there are instructions for installing IPX on Linux, but I'm using Mac OS X, for which there are no IPX solutions. However, I have found that there is now a (Windows) winsock wrapper that tunnels IPX packets over UDP called IPXWrapper
2007 May 31
0
Custom CLI (spoofing) ?
I'm trying to have a go at CLI spoofing. My outbound calls may go out over various VoIP providers, using least cost routing to determine which provider for call destination and time of day. No matter which provider I go out over, i'd like the called party to only see only one of my numbers - that number will be the only number i'll want people to call back on. To test, i've
2007 Jun 28
2
Caller ID Spoofing to be banned in the USA
Anyone running caller id spoofing applications in the USA running asterisk? Then it's time to move them to Canada or similar. http://arstechnica.com/news.ars/post/20070627-caller-id-spoofing-about-t o-be-outlawed.html Regards, Dean Collins Cognation Pty Ltd dean at cognation.net <mailto:dean at cognation.net> +1-212-203-4357 Ph +61-2-9016-5642 (Sydney in-dial).
2003 Sep 12
0
Q. on key sniffing/spoofing
Hi everyone, I'd like to set up the RSA keys for the IAX registration, but have a couple of Q's. I have the manual and can follow the instructions, but I want to understand the limitations. First, understand there will be a central Asterisk (which has the private key?) and several remote Asterisks (which are as automated as possible, and each have the same public key?). We
1999 Mar 17
0
CIAC Bulletin J-035: Linux Blind TCP Spoofing
Enjoy.... ugh. Dan ____________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N Batavia, IL
1996 Sep 19
0
CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= CERT(sm) Advisory CA-96.21 Original issue date: September 19, 1996 Last revised: -- Topic: TCP SYN Flooding and IP Spoofing Attacks - ----------------------------------------------------------------------------- *** This advisory supersedes CA-95:01. *** Two
2018 Jan 10
3
llvm-mc assembler, GNU as, and pc-relative branches for Arm/AArch64/Mips
# Summary As a consequence of comparing the RISC-V LLVM MC assembler to the RISC-V GNU assembler I've noticed that a number of targets have quite different handling for pc-relative jumps/branches with immediate integer operands in llvm-mc vs GNU as. I'll admit that this isn't likely to occur in hand-written code (as you'd almost always prefer to use a label), but thought it was
2009 Jun 18
2
[PATCH node-image] Keep nls_utf8.ko module on node-image
resolves: rhbz:504741 - nls utf8 kmod missing causes error messages during firstboot configuration --- common-blacklist.ks | 10 ++++++---- 1 files changed, 6 insertions(+), 4 deletions(-) diff --git a/common-blacklist.ks b/common-blacklist.ks index 48f30a6..eb59014 100644 --- a/common-blacklist.ks +++ b/common-blacklist.ks @@ -49,14 +49,16 @@ done # the following are lists of kernel
2014 Dec 01
2
[Bug 10977] New: Rsync path spoofing attack vulnerability (rsync 3.1.1 tested)
https://bugzilla.samba.org/show_bug.cgi?id=10977 Bug ID: 10977 Summary: Rsync path spoofing attack vulnerability (rsync 3.1.1 tested) Product: rsync Version: 3.1.1 Hardware: All OS: Linux Status: NEW Severity: critical Priority: P5 Component: core
2007 Apr 18
0
[Bridge] ARP spoofing.
Hello all. I know this does not directly relay to Ethernet bridging but I need some advise... anyone want to give me some info/help on the subject. In the interest of multipath routing I need to know if it is possible to do a one-way arp spoof. Lets start with the machines layout... br1------ADSL br2------cisco router-----serial line. br0-----Internal network. I already have
2006 May 24
3
Spoofing a BLF Signal?
Is there anyway to "spoof" a BLF signal to a phone from within a dialplan? That being so I can turn a BLF light on or off on a phone when a certain thing happens in a dialplan?
2005 Jan 30
1
Caller ID spoofing
Hello everybody! I am having the following problem and since I am a beginner in playing with asterisk, i can't solve it: I am trying to integrate my existing H.323 network in real world telephony by ISDN cards. The problem is that i DON'T want to change all e164 numbers in my h.323 network and my ISDN provider doesn't accept those identities (CIDs). So, i have to spoof the outgoing
2004 Nov 07
1
Spoof server name to redirect calls to another server?
Hi, I've got an ageing NT4 server on our NT4 domain. The hardware is getting unreliable and few people use it. Unfortunately/predicatably the few people who use it are senior staff and they have some (important, naturally) Excel spreadsheets which link to files on this server by name. As I haven't been entirely successful in weening them off this server I've been keeping it ticking
2014 Jun 13
1
Need to spoof the callerid using the AMI Originate
We have several customers we need to place outbound calls for (in a single system). May have to place calls for thousands of different caller ids. Customer signs a contract guaranteeing the caller id they provide is owned by them. I have everything setup for AMI Originate and can place the calls. However, I'm encountering a problem with the caller id. The system I'm dialing through
2023 Aug 18
1
Host key verification (known_hosts) with ProxyJump/ProxyCommand
On 18/8/23 18:37, Jochen Bern wrote: > On 18.08.23 07:39, Darren Tucker wrote: >> On Fri, 18 Aug 2023 at 15:25, Stuart Longland VK4MSL <me at vk4msl.com> >> wrote: >> [...] >>> The crux of this is that we cannot assume the local IPv4 address is >>> unique, since it's not (and in many cases, not even static). >> >> If the IP address is
2011 Aug 25
1
security: SIP header spoofing CHANNEL(recvip)?
I am currently suffering various SIP attacks. I am using the following extension to record the caller's IP address: exten => h,n,set(CDR(srcip)=${CHANNEL(recvip)}) However, in recent attacks, this IP address is not correct, and I believe that they are spoofing it. I am using asterisk 1.6.2.15. Does the CHANNEL(recvip) variable record IP show in the SIP header instead of the real, UDP
2013 Nov 19
2
macvtap direct and ip spoofing
Hi there. I have configured kvm domain (rhel6.4) with ethernet bridged over macvtap, and found no filtration applied except mac. 'virsh' just silently ignoring attributes 'filterref' and 'ip address' in different formats. No error on validate stage. Config examples: ... <interface type='direct'> <mac address='52:54:00:31:ae:1a'/>
2018 Dec 04
2
Incorrect placement of an instruction after PostRAScheduler pass
Hi, I’m facing a crash issue (--target=arm-linux-gnueabi -march=armv8-a+crc -mfloat-abi=hard) and debugging the problem, I found that an intended branch was not taken due to bad code generation after the Post RA Scheduler pass. A CMPri instruction after an INLINEASM block (which inturn contains a cmp, bne instruction) is being moved before the INLINEASM block incorrectly resulting in two
2007 Aug 06
3
how do I use shorewall to protect server from ARP spoofing attack ?
My firewall is using shorewall 3.0.x and CentOS Recently, I found that firewall is attaching from ARP spoofing.. There are a lot of "out of socket memory" in messages log ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and
2007 Apr 18
1
[Bridge] Making a bridge work without source address spoofing
So, I agree, the curent wireless card I have been given does not allow source address spoofing, but I still would like to use bridging. I wonder if anyone has tried modifying the bridge code to encapsulate the actual packet in some way so that the desired source address can be preserved? I am thinking of something like duplicating the ETH header, adding it to the beginning of the packet, so that