Win / TheDonald
Sign In
DEFAULT COMMUNITIES All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Reason: None provided.

I am a sys admin, let me shed some light on this.

Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.

The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.

TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.

It would be WAY more suspicious to see a MAC that could be verified by manufacturer in this instance.

Please upvote for visibility.

69 days ago
1 score
Reason: None provided.

I am a sys admin.

Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.

The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.

TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.

It would be WAY more suspicious to see a MAC that could be verified by manufacturer in this instance.

Please upvote for visibility.

69 days ago
1 score
Reason: None provided.

I am a sys admin.

Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.

The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.

TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.

It would be WAY more suspicious to see a MAC that could be verified by manufacturer in this instance.

69 days ago
1 score
Reason: None provided.

I am a sys admin.

Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.

The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.

TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.

It would be WAY more suspicious to see a mac that could be verified by manufacturer in this instance.

69 days ago
1 score
Reason: Original

I am a sys admin.

Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.

The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.

69 days ago
1 score