
For example, it enables the attacker to impersonate real devices (end stations or even routers) or to hide himself behind another network device. setting up a MAC address without changing the manufacturer and subsequent automatic activation of the new MAC addressĪ false MAC address allows to circumvent existing security mechanisms.setting up a MAC address of a different manufacturer.The MAC address falsification can happen in several ways: The attacker could use the fake identification (MAC address) to pass of as your own device and thus be able to, for example, intercept the network communication.

To put it simply, it can be falsification of your phone or computer identification within a network. MAC spoofing is an unauthorized change of MAC address, a MAC address falsification of a network device within a computer network.
