There are many ways to crack the network envelope routing. Today we will discuss how to clone a MAC address. In three steps: Find the valid MAC address, share the guard to crack the Netcom envelope router tutorial, and clone the MAC address.
Crack the clone MAC address of China Netcom electronic envelope Routing)
First, make sure that you are able to access the Internet in the single-host computer. It indicates that the MAC address of the computer Nic is a valid MAC address. Go to the MSDOS mode of the system and run the ipconfig/all command to find the MAC address of the computer Nic. Example: 00-50-8D-D1-71-A7.
Cracking the China Netcom electric envelope route: Find a valid MAC address
Unplug the external lead from the NIC of the single-host computer and insert the WAN port of the Broadband Router. Connect the NIC of multiple clients to the lanport of the Broadband Router. Turn on the power of the Broadband Router. Start ie on any client connected to the Broadband Router. In the address bar of IE browser, enter the IP address of this Broadband Router, http: // 192.168.1.1. Go to the Web Settings page of The vro. Click "Network Parameters" in the Left window of the configuration page and select "clone MAC address. The "clone MAC address" window appears. In the "MAC address of the current management PC" window, enter the "valid MAC address": 00-50-8D-D1-71-A7.
Click Clone MAC address. The MAC address is entered in the "MAC address" window. Finally, restart the vro to make the settings take effect. In this way, the vro obtains a valid MAC address bound to the ISP. You can share the Internet with multiple computers. Note: The "clone MAC address" button for some routers is "clone mac" in English ". Appendix: Modify the MAC address of the NIC. Experience has proved that the MAC address of all computer NICs in the LAN can be modified or shared with the Internet.
Some broadband providers have bound MAC addresses on the authentication server to limit the number of connected users. At this point, you can first connect the computer bound with the MAC address to the lanport of the router (but the router should not connect to the Modem or the wiring provided by the ISP), and then use the MAC address cloning function of the router, copy the MAC address of the network adapter to the WAN port of the Broadband Router.
The "MAC address clone" function of the Broadband Router breaks through the address binding of the broadband provider to achieve Internet sharing among multiple computers. Take TP-Link TL-R400 + small router as an example. Go to the Web Settings page of The vro from the computer with the bound MAC address, and select "Initial Settings" under "Basic settings" in the main menu ", click "modify" in the "wan interface type" column, and then select "Dynamic IP ".
After saving, return to the "Initial Settings" Page. There is a text box after the option in the "Wan MAC address" column, where the content is the MAC address of the local machine, you can modify the MAC address in the text box and enter the MAC address of the bound Nic. If you do not know the MAC address of the NIC, you can select Clone MACMAC address Clone) button to Clone the MAC address of the NIC of the current computer to the WAN port of the TL-R400 +. Save and restart the vro.
Note: You must select "Dynamic IP" in the "wan interface type". Otherwise, the option of modifying the MAC address and cloning MAC address of the WAN interface will not appear. If you are using other access methods, such as static IP addresses and PPPoE, you can go to the configuration page to modify the WAN type after completing the preceding settings.
Cracking China Netcom electric envelope routing: Shared guard cracking China Netcom electric envelope router tutorial
Recently, some friends said that China Telecom Netcom shared Internet access through vrouters. Today, my colleagues also asked this question. They searched for a tutorial on the Internet and put it up for future use. You need to download a software named "shared guard ".
Cracking the China Netcom electric envelope route: Clone the MAC address
At present, China's Netcom or Telecom broadband has blocked multi-host internet sharing in some regions to ensure the interests of ISP (network operator) itself, because the blocking methods used by different cities or regions are different, therefore, the corresponding cracking methods have also changed. However, most of them adopt the MAC address detection mechanism, which usually locks the MAC address of the first computer Nic connected to the network, as the only valid Terminal to provide normal network connection services.
In the case of Internet sharing, the vro as a network device carries a MAC address, which occupies this "quota" after it connects to the wired broadband ", when other computers connected to the vro share the Internet, the local computer detects that the IP packets sent by the vro contain other illegal MAC address information, in this way, the local terminal will discard or close the detected IP data packets.
Tip: when the network adapter sends an IP packet or a packet of other network layer protocols, it will automatically split the packet and package it into a data frame with a maximum of 1518 bytes and a minimum of 64 bytes. The data frame includes the target MAC address, the source MAC address, the protocol type in the data packet, and a dword crc code.
In many cities, it is difficult to crack the rules that take effect permanently by binding a MAC address or changing the account or password during the dialing process, you must call to inform the network operator that the network card has been changed or use the sniffing software to detect the real account or password so that the correct dialing parameters can be set in the Broadband Router.
However, from your description, we can see that in your city, the method of binding the MAC address of the dial-up host Nic is used to crack the network envelope routing, therefore, using the "special dialing" mode of the Broadband Router can make all IP packets sent by the router contain unified MAC address information, in order to break through the restrictions.