Solved

Searching by a MAC Address over the internet to find lost, stolen and missing hardware.

Posted on 2006-07-10
4
372 Views
Last Modified: 2008-03-10
I'm looking to find some lost and/or stolen equipment.  I have the mac addresses of the laptops and computer hardware that have come up missing from our office.  The local law enforcement doesn't seem interested in tracking them down, and I want to give them a little help.

Is there a way to scan the internet, looking for those mac addesses?  And then start to track them down by finding out IP addresses and working backwards to the ISP?

And if so, What would I need and can this be done?

Thanks,
0
Comment
Question by:rahowell2
4 Comments
 
LVL 32

Assisted Solution

by:rsivanandan
rsivanandan earned 167 total points
ID: 17079067
No way, sorry.

Even if those laptops are connected to the Internet, only the adjacent router can see the mac address of the machine.

Remember the theory;

1. Source IP and Destination IP remains the same throughout the communication.

2. Mac addresses keep changing throughout the communication.

Cheers,
Rajesh
0
 
LVL 27

Assisted Solution

by:pseudocyber
pseudocyber earned 166 total points
ID: 17080392
agree with Rajesh.

That's how companies that develop "phone home" software make money - it's entirely client (on the computer in question) driven.
0
 
LVL 43

Accepted Solution

by:
Steve Knight earned 167 total points
ID: 17081279
Agreed.  If they are behind a home router then not even an ISP could help you as no-one would ever see the mac address, if they are connected straight to a cable modem by ethernet for instance then there is potential for the cable co. to know the mac address but that it very unikely to help at all.  If it gets used by USB ADSL modem or dialup still no chance.

Of course I'm sure they were all fully backed up, data encrypted and strong passwords on there like we all do of course....(not)

teve
0
 

Author Comment

by:rahowell2
ID: 17085869
Well thanks Guys, just feel like I been shot in the foot again.  I thought I just might have a chance.  Thanks again.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
NFS vs, iSCSI throughput ? 20 119
DHCP via Multiple VLANS ? 3 67
Issue with  IP address/conflict 10 87
Exchange 2010 smtp and senderbase ratings 3 49
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now