I am a sys admin, let me shed some light on this.
Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.
The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.
TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.
It would be WAY more suspicious to see a MAC that could be verified by manufacturer in this instance.
Please upvote for visibility.
I am a sys admin.
Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.
The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.
TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.
It would be WAY more suspicious to see a MAC that could be verified by manufacturer in this instance.
Please upvote for visibility.
I am a sys admin.
Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.
The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.
TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.
It would be WAY more suspicious to see a MAC that could be verified by manufacturer in this instance.
I am a sys admin.
Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.
The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.
TLDR: Anyone running Linux VM's for cyber attacks is never going to have a manufacture verifiable MAC.
It would be WAY more suspicious to see a mac that could be verified by manufacturer in this instance.
I am a sys admin.
Almost all "hacking" is done via Virtual machines nowadays. Most people who are running 0-days or accomplished "hackers" are using Linux VM's.
The most common linux distro for cyber attacks is TAILS. On tails you can generate any custom MAC you want to act as your virtual ethernet adapter.