Greetings, all. After I have spoofed the MAC address on a NIC, how can I query to determine what the original MAC value is?
For example, here is a transcript of a recent MAC address change and a revert: # # PART 1 # # the original MAC # ifconfig eth0 | grep HWaddr eth0 Link encap:Ethernet HWaddr 90:e6:ba:4e:26:96 # # PART 2 # # spoofing the MAC # ifconfig eth0 down # ifconfig eth0 hw ether 00:01:02:03:04:05 # ifconfig eth0 up # ifconfig eth0 | grep HWaddr eth0 Link encap:Ethernet HWaddr 00:01:02:03:04:05 # # PART 3 # # revert to original MAC # rmmod r8169 ; modprobe r8169 # ifconfig eth0 | grep HWaddr eth0 Link encap:Ethernet HWaddr 90:e6:ba:4e:26:96 In this case, I was able to revert to the original MAC by reloading the kernel module for the NIC. I could have also done this by re-running Part 2 using the original MAC from Part 1. However, let's imagine I did not run Part 1. How can I query the system to determine what the NIC's original MAC is without resorting to unloading/loading the NIC's kernel module? Regards, - Robert -- Central West End Linux Users Group (via Google Groups) Main page: http://www.cwelug.org To post: [email protected] To subscribe: [email protected] To unsubscribe: [email protected] More options: http://groups.google.com/group/cwelug
