Help on MAC Addrses

Posted on 2002-03-16
Medium Priority
Last Modified: 2010-04-14
Hi friends,

How i will access remote computer if i know the mac address of remote comuter.

Thank you

Question by:narendrakumar1978
LVL 32

Expert Comment

ID: 6871648
Please be more specfic.  

You don't normally communicate with a remote computer via its MAC address.  In fact I'm only aware of one protocol that does this, namely the Microsoft NETBEUI protocol.  The problem with such a protocol is that it's unroutable.  Since MAC addresses are essentially "random" from a network point of view, there is no way to know where a particular MAC address "lives" without broadcasting your message to the entire world.  Obviously that both impractical and undesirable.

More advanced protocols like TCPIP don't use the MAC address to route the message.  They use a hierarchical address.  The most significant parts of the address specify the NETWORK where the remote host lives and the least significant parts specify the specific HOST you want.  (Which parts are which is the basis for the commonly misunderstood NETMASK or SUBNET MASK TCPIP property but that's another discussion....)

On the INTERNET (which is TCPIP based) you cannot reliably locate the IP address of a host from its MAC address.  There is a protocol called RARP (Reverse Address Resolution Protocol) that will provide the IP from a MAC but a RARP server can only resolve hosts from whom it's heard traffic.  Usually this is only the local network and whatever remote hosts it has seen packets from.

Author Comment

ID: 6873565

You are right and i know this but is there any software u know through that i can hack the remote computer if i know the mac and ip address of remote computer...

LVL 32

Expert Comment

ID: 6874508
I think you're looking for help in the wrong place.

Try one of the "kiddie" hacker/cracker/warez site and go away from here!
LVL 12

Expert Comment

ID: 6875886
There is software that you could use to hack the other computer if you knew it's mac and IP address.  You'd just need to find some of that software and then it would be easy.


Get a clue.

Accepted Solution

ComTech earned 0 total points
ID: 6876390

3. Guidelines for Use
Experts Exchange Services and Site are only available for use by individuals who are age 13 or over. The Services and Site may not be used by scripts, machines or automated services.

Experts Exchange Services and Site may be used only for lawful purposes. You must comply with all applicable local, state, national and international laws, regulations or conventions, including without limitation those related to data privacy, international communications, and exportation of technical or personal data. You may not use the Experts Exchange Services or Site for any criminal or illegal activities or any activities that might be legally actionable.

Experts Exchange reserves the right to determine what constitutes Internet abuse and objectionable conduct. If Experts Exchange believes, in its sole discretion, that a violation of these Guidelines has occurred, it may take responsive action. Such action may /include, but not be limited to, permanent removal of illegal or inappropriate information or content, or suspension or termination of your membership and access to Experts Exchange Service

* using a Member Name or posting, transmitting or linking to any text or images that are sexually explicit, pornographic, violent, racially or ethnically objectionable or grossly offensive to the online community

* posting, transmitting or linking to defamatory and libelous statements or other statements that would violate any third party's privacy or publicity rights

* posting, transmitting or linking to profane language, descriptions of situations or scenarios considered, in the opinion of Experts Exchange, inappropriate for the Experts Exchange membership

* impersonating any person or using a name that you are not authorized to use

* planning illegal activities, such as creating computer viruses, building a bomb or counterfeiting money

* advertising, promoting in any way or offering to sell any goods or services for any commercial purpose

* soliciting individuals for employment other than in designated areas (for example, within a discussion thread)

* soliciting individuals to join other services comparable to or competitive with Experts Exchange

* promoting any products or services that are unlawful at the location at which the content is posted or received

* posting any content that infringes any third party's intellectual property rights or violates any confidentiality agreements or contracts of employment

* posting, transmitting or linking to statements that are intentionally false or misleading

* introducing viruses, worms, harmful codes or Trojan horses

* spamming, flaming or other similar activities

* misusing the Experts Exchange point system

* violating the guidelines for academic honesty or other unethical behavior.

Violations of system and network security are prohibited. You may not misuse system resources including but not limited to employing posts or programs which consume excessive CPU time or storage space, permitting use of mail services, mail forwarding capabilities, POP accounts or auto-responders other than for your own account. If you notice a problem with other members not following these Guidelines, please notify us by contacting Community Support.

Hacking does follow under these guidlines, and such questions are not allowed on Experts Exchange.

I am locking this question due to content in your second remark regarding Hacking.  If no reasonable explinatin if forthcoming, this queston will be deleted.

CS Admin @ EE


Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
If anyone asked you to network diagram of the internet, it was drawn in the form of a fluffy cloud which further became known as cloud computing. Popularly cloud computing is defined as workloads that run over the internet in a commercial provider’s…
Screencast - Getting to Know the Pipeline
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses
Course of the Month15 days, 2 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question