Greetings, all.

After I have spoofed the MAC address on a NIC, how can I query to
determine what the original MAC value is?

For example, here is a transcript of a recent MAC address change and a revert:

# # PART 1
# # the original MAC
# ifconfig  eth0 | grep HWaddr
eth0      Link encap:Ethernet  HWaddr 90:e6:ba:4e:26:96

# # PART 2
# # spoofing the MAC
# ifconfig eth0 down
# ifconfig eth0 hw ether 00:01:02:03:04:05
# ifconfig eth0 up
# ifconfig  eth0 | grep HWaddr
eth0      Link encap:Ethernet  HWaddr 00:01:02:03:04:05

# # PART 3
# # revert to original MAC
# rmmod r8169 ; modprobe r8169
# ifconfig  eth0 | grep HWaddr
eth0      Link encap:Ethernet  HWaddr 90:e6:ba:4e:26:96

In this case, I was able to revert to the original MAC by reloading
the kernel module for the NIC.  I could have also done this by
re-running Part 2 using the original MAC from Part 1.

However, let's imagine I did not run Part 1.  How can I query the
system to determine what the NIC's original MAC is without resorting
to unloading/loading the NIC's kernel module?

Regards,
- Robert

-- 
Central West End Linux Users Group (via Google Groups)
Main page: http://www.cwelug.org
To post: [email protected]
To subscribe: [email protected]
To unsubscribe: [email protected]
More options: http://groups.google.com/group/cwelug

Reply via email to