MAC address of New SD
#1
MAC address of New SD
Does anyone know how to get the unique MAC address of these trucks? Is it printed somewhere like the key code is for ignition keys, or is there an "About" screen for SYNC 3 that will show that informaiton? I need this for my Wi-Fi network, as I use MAC filtering as a security measure on my home network. I need to enter it in my wireless router's access list so the router will "allow" the truck access to my network.
Just FYI, the MAC address will look something like this: 01-23-45-67-AB-CD or 01:23:45:67:AB:CD
Thanks.
Just FYI, the MAC address will look something like this: 01-23-45-67-AB-CD or 01:23:45:67:AB:CD
Thanks.
#2
Does anyone know how to get the unique MAC address of these trucks? Is it printed somewhere like the key code is for ignition keys, or is there an "About" screen for SYNC 3 that will show that informaiton? I need this for my Wi-Fi network, as I use MAC filtering as a security measure on my home network. I need to enter it in my wireless router's access list so the router will "allow" the truck access to my network.
Just FYI, the MAC address will look something like this: 01-23-45-67-AB-CD or 01:23:45:67:AB:CD
Thanks.
Just FYI, the MAC address will look something like this: 01-23-45-67-AB-CD or 01:23:45:67:AB:CD
Thanks.
Unless something was drastically changed on the 2018`s, all one has to do is search for the WiFi network on the SYNC screen and once it`s found, just type in the password.
#3
#5
And since we're on the topic, MAC address filtering isn't considered a reasonable security feature since any clever device/hacker can fake/duplicate a mac address very easily. They can just read them off the back of many of your home devices or packet sniff the network if it's not encrypted. It's much more valuable to have WPA2 wifi security with a password. IMO, the hassle of MAC address filtering isn't worth the value (minimal). So for anyone who is wondering should I turn that on, save yourself the hassle and stick with WPA2 security only.
#6
#7
And since we're on the topic, MAC address filtering isn't considered a reasonable security feature since any clever device/hacker can fake/duplicate a mac address very easily. They can just read them off the back of many of your home devices or packet sniff the network if it's not encrypted. It's much more valuable to have WPA2 wifi security with a password. IMO, the hassle of MAC address filtering isn't worth the value (minimal). So for anyone who is wondering should I turn that on, save yourself the hassle and stick with WPA2 security only.
As for its usefulness, yes, it is subjective, however it offers an additional layer on top if WPA2 when they are used together.
Trending Topics
#8
If they are reading the MAC off the back of a device that already has access to the network, he has bigger issue. Best case, his phone has been stolen, worst case there has been a break in.
As for its usefulness, yes, it is subjective, however it offers an additional layer on top if WPA2 when they are used together.
As for its usefulness, yes, it is subjective, however it offers an additional layer on top if WPA2 when they are used together.
Thanks everyone, I appreciate your responses.
#9
All WiFi is now vulnerable and susceptible to brute force attacking. It is just a locked door, which only keeps honest people honest. I commend you for taking the extra step, but if someone wants in, they are going to get in. If you wanted to be real **** about it, put your wifi on a dmz and limit bandwidth to the point it cannot affect the performance of your main network. Good luck on getting the MAC - kinda fun with all the tech these new trucks have.
Take a look at this article - just when you think you are safe...
https://thehackernews.com/2018/04/io...ermometer.html
Take a look at this article - just when you think you are safe...
https://thehackernews.com/2018/04/io...ermometer.html
#10
Beyond that, if you really think that enabling MAC filtering on the router and typing 12 hexadecimal characters into the screen is a "hassle", you've got issues ...
To the OP: I just enable the mobile hotspot on my phone, connect the truck to the phone, then grab the MAC address.
#11
It could be exclusive in many router configurations (OP didn't say he had other security measures), which is why I mentioned WPA2. Most modern routers would warn strongly against this but it can be done. I was concerned someone (OP or reader) would think MAC address filtering added real security value when it does not to any malicious actor. It's about the security equivalent of adding a latch lock to a door.
In short, I don't think MAC address filtering is worth the paper it's written on (joke). It is clearly hassle to the OP who started a thread on the topic. I think folks would be much better off spending their time focused on securing their devices and just use WPA2 on their router with a good password.
And now back to trucks.
In short, I don't think MAC address filtering is worth the paper it's written on (joke). It is clearly hassle to the OP who started a thread on the topic. I think folks would be much better off spending their time focused on securing their devices and just use WPA2 on their router with a good password.
And now back to trucks.
#12
From another device on the same wifi network. ping the ip address of the truck, then from a 'cmd' prompt if Windows, or terminal from a mac os - enter 'arp -a'
In windows the second column will show the physical address ( MAC address ) on a mac os the output will look like below,,
(192.168.0.8) at c8:e0:eb:57:a9:43 on en0 ifscope [ethernet] the c8:e0:eb:57:a9:43 is the MAC address for ip 192.168.0.8...
Your wifi router should also be able to show the same info..
In windows the second column will show the physical address ( MAC address ) on a mac os the output will look like below,,
(192.168.0.8) at c8:e0:eb:57:a9:43 on en0 ifscope [ethernet] the c8:e0:eb:57:a9:43 is the MAC address for ip 192.168.0.8...
Your wifi router should also be able to show the same info..
#14
From another device on the same wifi network. ping the ip address of the truck, then from a 'cmd' prompt if Windows, or terminal from a mac os - enter 'arp -a'
In windows the second column will show the physical address ( MAC address ) on a mac os the output will look like below,,
(192.168.0.8) at c8:e0:eb:57:a9:43 on en0 ifscope [ethernet] the c8:e0:eb:57:a9:43 is the MAC address for ip 192.168.0.8...
Your wifi router should also be able to show the same info..
In windows the second column will show the physical address ( MAC address ) on a mac os the output will look like below,,
(192.168.0.8) at c8:e0:eb:57:a9:43 on en0 ifscope [ethernet] the c8:e0:eb:57:a9:43 is the MAC address for ip 192.168.0.8...
Your wifi router should also be able to show the same info..
I'm sure the OP had plenty of suggestions by now, but I'll throw mine in. Add a non-mac filtered SSID to your access point (don't advertise it if you want some level of obfuscation). If you have "fancy enough" equipment you could: grant the SSID access to a separate VLAN, enable DHCP on the VLAN and just filter all traffic trying to leave the VLAN. You can grab your MAC from the access point, arp, DHCP table, etc. For even more fun, put a simple password on this network and setup an old PC with a honeypot app. See who's knocking at the door to give you an idea of the threat landscape in your hood.