| |

VerySource

 Forgot password?
 Register
Search
View: 1119|Reply: 4

Talk about MAC network card address again

[Copy link]

1

Threads

2

Posts

3.00

Credits

Newbie

Rank: 1

Credits
3.00

 Taiwan

Post time: 2020-1-30 15:00:01
| Show all posts |Read mode
Dear All:
There are several commonly used methods to obtain the remote MAC network card address as far as I know:
1> SendARP
2> NetBIOS
3> WMI
Discuss the advantages and disadvantages of the above separately:
1> SendARP cannot get the MAC address of the remote computer via the Internet.
  This obviously does not meet our requirements.
2> NetBIOS is said to be unable to obtain the MAC address of the laptop, and it is not possible on some computers.
3> It can be obtained using WMI, but when accessing the webpage, the user must allow the execution of unsafe plug-in content.
In summary, the above three methods of obtaining MAC network card addresses are all flawed!
Is there a way that when users browse the web,
Get his MAC address silently, that is, you can break through the limitations of routing and Internet access.
You can also distinguish between desktop and NOTEBOOK,
It does not require users to agree to implement insecure content plugins.
Excuse me, is there any way to achieve this requirement?
Reply

Use magic Report

0

Threads

64

Posts

35.00

Credits

Newbie

Rank: 1

Credits
35.00

 China

Post time: 2020-3-14 15:00:01
| Show all posts
There is no way other than viruses. And rogue software is actually very simple, it is disguised as a useful plug-in, coaxing customers to install.
Reply

Use magic Report

0

Threads

3

Posts

3.00

Credits

Newbie

Rank: 1

Credits
3.00

 China

Post time: 2020-3-17 11:00:01
| Show all posts
Did milozy1983 (Detective) work? I can't find many pieces of code on the Internet.
Reply

Use magic Report

1

Threads

2

Posts

3.00

Credits

Newbie

Rank: 1

Credits
3.00

 Taiwan

 Author| Post time: 2020-3-29 14:45:01
| Show all posts
The method mentioned by milozy1983 (Detective) is the 3> WMI method I mean.
I have implemented it, and the problem is that the user must agree to execute the insecure content plugin to obtain it.
Still cannot achieve the best results.
Reply

Use magic Report

0

Threads

64

Posts

35.00

Credits

Newbie

Rank: 1

Credits
35.00

 United States

Post time: 2020-7-19 11:15:01
| Show all posts
For example, build a pornographic movie website by yourself, and then let users install ActiveX plug-in to watch. Or develop a Flash player, a Web online editor, an ASP.NET demo program for learning, a simple and easy-to-use enterprise management program, etc., disguised as useful software that can be installed on the client machine via the Web, and then use this software to install The firewall of the user's machine is opened, and the account is sent to its server.
Reply

Use magic Report

You have to log in before you can reply Login | Register

Points Rules

Contact us|Archive|Mobile|CopyRight © 2008-2023|verysource.com ( 京ICP备17048824号-1 )

Quick Reply To Top Return to the list