Angry IP Scanner. Despite being deceptively simple Angry IP Scanner does exactly what one would. If you see the response, then the suspect wasn't running this 'MAC address filter' on the card, and is hence sniffing on the wire. There are ways defending against this. Now that this technique is widely publicized, newer hackers will enabled a virtual MAC address filter in their code.
An attacker can always determine the client's MAC address if they can sniff packets to or from the client. This is true regardless of whether encryption is used or not. The MAC address is in the outer encapsulation layer of the 802.11 packet, and there is no encryption applied to that level. Added local/remote MAC addresses (relevant only for local network, and it doesn't work with raw sockets) Added IPNetInfo integration - When you put IPNetInfo utility in the same folder of SmartSniff, You can view the information about the remote IP addresses. Added IP Country columns to display the country name of IP addresses.
![For For](/uploads/1/1/9/8/119846559/437718526.gif)
![Name Name](/uploads/1/1/9/8/119846559/196872619.jpg)
I am working on a research project which is aimed at social behaviour measuring of people.
One aspect of this project is capture MAC address of smartphones nearby without actually connecting to them. The concept is similar to airmon-ng and airbase-ng which I have been using but it requires a laptop to work (not handy to carry everywhere).