[Q] How to spoof WiFi Mac Address for Snapdragon 625 SoC? - General Questions and Answers

How to spoof WiFi Mac Address for Snapdragon 625 SoC?
My device is Redmi 5 Plus [MEG7] and try to change hex number in xqcn file but did not find any range of my device mac address. Any advice for spoof mac for SD625 SoC.

Related

[Completed] [Q] Mac change app for kk 4.4

Hello! I'm searching a app for changing the mac adress for android kk 4.4. devices. Everything what i found was working only whit 4.3 soft. My phone is Sony Xperia Z.
MAC Address is very specific at hardware level. It is also unique to each device's hardware. There is a reason it can not be changed. Can you please specify details around why you need to change it ?
I received a ban in the workplace. A friend of mine has an older version of Android and it has no problem replacing mac address. In fact, when I change my mac address, I do not even connect to the home network.
Please review [Guide] [Root] How To Spoof The Mac Address Of Any Android Device

Updated iproute2 binary

I'm using ipv6 and I find that Android's implementation makes it very hard to identify my android devices in my netflow data (SLAAC coupled with use of temp addresses / privacy extensions yields long, unwieldy and ever-changing addresses). On my Windows and Linux boxes, I tend to use a combination of DHCPv6 and SLAAC coupled with an explicit ip token that allows me to give my devices IPv6 addresses where the suffix corresponds to the last octet of the IPv4 address. This makes tracking and identifying my devices a little easier. For example, a device with an IPv4 of 192.168.1.76 would get an IPv6 of fd42:2181:64f5::76/48.
Needless to say, on current versions of Marshmallow and Lollipop, this is currently impossible in an out-of the-box environment as Android doesn't support DHCPv6 and neither does the cut down ip binary provide the ip token functionality. Accordingly I cloned the latest version of the iproute2 source and compiled it for Android. Now my devices can use SLAAC with an ip token, get assigned the prefix by the router and generate their own suffix according to my desired paradigm.
In the hope that someone else might find it useful, I've uploaded armeabi-v7a and aarch64 binaries for both sdk22 and sdk23. Just use the appropriate binary to replace your existing one.
Download: iproute2

WiFi Chipset INFO

This app simply shows WiFi chipset vendor from the WiFi MAC Address.
Download WiFi Chipset INFO: https://play.google.com/store/apps/details?id=org.vndnguyen.wifichipset
Enjoy!
v1.0.2: Minor bug fixes.
v1.0.1: Initial release.
All fine on Z Play with LOS14.1
Everything is fine for me. thanks for all
My Xperia S should have a BCM4330, but it's just reported as "Sony Ericsson Mobile Communications AB"
My Nexus 7 (2012) bas a BCM4330, too, but is reported as "Asustek Computer Inc" ... nevertheless as far as I know th BCM4330 should be secure.
Stock HTC U11 is save
Is this checking 43XX or only specific models? Based on the CVE my S8 is affected seeing as it's BCM43xx (S8 is BCM4361 )
My ZTE Axon 7 is fine! No worries there!
Is this app open source?
All fine on my Motorola Nexus 6 with latest Pure Nexus Rom :good:
Sent from my Nexus 6 using XDA Labs
I believe this app just looks at the MAC Address OUI of your wifi interface - which is not an accurate way of determining if your phone is potentially vulnerable to Broadpwn
WARNING TO ALL
Bogus results, do not trust this app at the time of this post! States my WiFi chip in my LG G5 is "made by LG Electronics" and I'm safe from BroadPwn. However, a physical teardown (https://www.ifixit.com/Teardown/LG+G5+Teardown/61205) clearly shows the motherboard using a vulnerable Broadcom BCM43xx series chip, namely Broadcom BCM43455.
LG's own Security Bulletin page also has not listed BroadPwn's code CVE-2017-9417 yet, so it is still not patched by the manufacturer and thus is vulnerable. (https://lgsecurity.lge.com/security_updates.html)
The information this app is pulling from the system is inaccurate. MAC Addresses tell you the manufacturer of the entire device, NOT the specific WiFi chip on the motherboard itself. Otherwise Samsungs and LGs and Apples would *all* be listed as "Broadcom" in router logs...
Many here actually have Broadcom chips and are now duped into a false sense of security as a result of this app. This needs to be removed from here and the XDA Portal ASAP before more are fooled. Users, please remain skeptical and investigate your hardware more closely than just this one app.
Please update the app to detect BCM4361 in S8/S8+. It should not be looking at the Murata packaging.
The app uses the wifi mac address and runs it again a mac address database.
That is not a working solution to detect the wifi chip in a smartphone.
The OnePlus 3 uses a Qualcomm QCA6174 chip. But it is detected as "OnePlus Tech (Shenzhen)Ltd" because they use their own mac address like nearly every smartphone vendor
It would be better to use other hardware IDs e.g. the one you get via lspci.
If you are not checking the patch level the Nexus 6 should be listed as vulnerable as it is listed in the original article.
MAC Addresses tell you the manufacturer of the entire device, NOT the specific WiFi chip on the motherboard itself.
Click to expand...
Click to collapse
Nope, the above quoted clause is not correct.
My Galaxy Note 4 comes with the WiFi MAC address 90:B6:86:1A:74:FE and it's from Murata Manufacturing Co. (a manufacturer from Japan), not from Samsung itself.
OnePlus 5 safe.
vndnguyen said:
Nope, the above quoted clause is not correct.
My Galaxy Note 4 comes with the WiFi MAC address 90:B6:86:1A:74:FE and it's from Murata Manufacturing Co. (a manufacturer from Japan), not from Samsung itself.
Click to expand...
Click to collapse
Let me clarify by revising that statement to be "MAC Address will tell you the network components' vendor (may or may not match manufacturer of the rest of the device), but NOT the specific chips used as part of the networking circuits."
That's why BroadPwn is a very scary exploit, the Broadcom 43xx chips are used as part of many different networking packages and rebrandings from vendors other than Broadcom itself. This chip family is so common it affects billions of mobile devices.
**Your rebuttal precisely shows yourself to be at risk.**
Murata Manufacturing Co. is sourced on many Smasung devices to provide networking components, but they source specific chips from others. If you look at their products pages you will find they list the specific chipsets used, many of which are Cypress brand chips. e.g. http://wireless.murata.com/eng/products/rf-modules-1/wi-fi-bluetooth.html
Cypress acquired Broadcom; all CYW43xx chips are direct renames of BCM43xx chips mentioned at the heart of the BroadPwn exploit. http://www.cypress.com/documentatio...wifi-ieee-80211ac-macbasebandradio-integrated (PDF link on that page explains the renaming of the chip series.)
To summarize: Samsung often uses Murata packages, which include Cypress, which includes Broadcom. In the case of your Galaxy Note 4, it has a BCM4358 chip in it.
http://www.anandtech.com/show/8613/the-samsung-galaxy-note-4-review/9
BCM4358 is specifically listed as a known vulnerable target of the BroadPwn exploit. It will be discussed in detail at Black Hat USA 2017.
https://nvd.nist.gov/vuln/detail/CVE-2017-9417
https://www.blackhat.com/us-17/brie...os-via-a-bug-in-broadcoms-wi-fi-chipsets-7603
If I may ask the exact method of your app, is it simply looking up the MAC Address against a vendor database? If so,1) Vendors not named Broadcom that use BCM43XX chips as a piece of their packages will erroneously show as OK, and 2) Broadcom's own networking products not including chips from the BCM43XX family may falsely be reported as vulnerable.
All of this said, please reconsider keeping your app published as it is; either take it down or revise the code ASAP. To reiterate it is dangerous to erroneously tell other device owners they are safe based on MAC Address info alone, just because it returns a vendor value other than "Broadcom". A vulnerable BCM43xx chip likely still lurks underneath the other names.
OK thank you all for your clarifications.
To avoid misunderstanding, I have removed the "BroadPwn check".
The app now only shows WiFi MAC vendor from the WiFi MAC address.
It does not check for the BroadPwn issue anymore.
Sorry for the inconvenience.
The app is up again in the Play Store.

WiFi Regulatory Domains - Is it modifiable?

As the title states, is it possible to modify the country code to adjust the WiFi Regulatory Domains? Specifically to open previously invisible channels on both 2.4 GHz and 5 GHz.
It does not matter if it is by an application or by modifying with root.
Thank you.

[APP][XPOSED][5.0-11]Android Faker - A Module For Spoof Your Device

Android Faker
So i was try to learn About Xposed Framwork more Deep then i was why should not try for make own module so i started work on it try to learn things how xposed framworks works then after learning i made this app its a simple xposed module which will help you to spoof your device ids so you can save your real ids and its also work some case when a app blocked you on device ids base like imei , hardware id, etc.
Compatibility:
This Module will Support Android 5.0 +
Features:
*Edit\Random Value.
*Random All Value by 1 Click
*Beautiful Material Design UI
This Module Spoof These Ids:
Imei
hardware id
mac address
mac bssid
mac ssid
bluetooth mac
android id
sim serial id
sim sub ids
mobile No
Special Thanks:
Mikanoshi for help me and make preference readable.
C3C0 for teach me about selinux security.
Note :- This Module never change real ids so don't ask Can i spoof my service providers and do anything wrong or right and they will never trace you.
Version:
1.0
Download : Android Faker
Shared @aicp
AndroidX said:
Android Faker
So i was try to learn About Xposed Framwork more Deep then i was why should not try for make own module so i started work on it try to learn things how xposed framworks works then after learning i made this app its a simple xposed module which will help you to spoof your device ids so you can save your real ids and its also work some case when a app blocked you on device ids base like imei , hardware id, etc.
Compatibility:
This Module will Support Android 5.0 +
Features:
*Edit\Random Value.
*Random All Value by 1 Click
*Beautiful Material Design UI
This Module Spoof These Ids:
Imei
hardware id
mac address
mac bssid
mac ssid
bluetooth mac
android id
sim serial id
sim sub ids
mobile No
Special Thanks:
Mikanoshi for help me and make preference readable.
C3C0 for teach me about selinux security.
Note :- This Module never change real ids so don't ask Can i spoof my service providers and do anything wrong or right and they will never trace you.
Version:
1.0
Download : Android Faker
Click to expand...
Click to collapse
I wish this worked with vmos
Your app has broken my phone. Samsung note20 ultra(android11).
It still restart herself for 9 times.
The last restart he has deleted all the modules saved in magisk.
Im lucky because he has delete it, that make me delete your app and re install xposed framework.
The problem in your app. Update it and make it work with all versions and fix her bugs

Categories

Resources