Spoofing your MAC address - which ones to use and how often to change them?
I was reading the "How Hackers Steal Your Internet & How to Defend Against It" article for the first time (it's located at "https://null-byte.wonderhowto.com/how-to/hackers-steal-your-internet-defend-against-0130205/").
The section that I was wondering about is about the 2nd one down the page, called "Step 1 Spoofing a MAC Address". Specifically, I'm wondering about various things related to MAC address spoofing, such as: Which MAC addresses to spoof to?, How often to change the spoofed MAC address?, and things like that...
Which MAC addresses to spoof to?
I'd imagine that any randomly chosen MAC address will do, as alluded to in the article. The main point is probably that the one that you spoof to is different than your real one (the one that's on your hardware). However, are certain types of MAC addresses better to use than others? And, along the same lines, are there any MAC addresses that you'll want to avoid spoofing to?
The latter question seems to be easier for me to answer than the first question. For instance, one would probably not want to spoof to the MAC address of the: White House, CIA, FBI, NSA, or any similar entity (whether it be a federal or local entity). A MAC address that you know belongs to a school that's only several miles down the road from where you live might be another one to avoid using.
How often to change the spoofed MAC address?
One of the things that I was wondering about was what would be the best frequency to change the MAC address that one spoofs to (ie- when is it time to make up and/or use another number)? This question is much more difficult for me to think of possible answers to than the previous question.
I'd imagine that it wouldn't be necessary to change it every hour or day (maybe a daily change frequency might be warranted if one does a lot of hacking). And, at the other extreme, I'd think that it probably isn't the best policy to only change it once a year.
I'm not sure, but maybe the best time to change the "spoofed to" MAC address is just after a hacking session (if that case holds any water, then a daily change frequency might not be too often as to be a time waster).
With my answers to the above two questions, I was just brainstorming and putting ideas out there. I don't have near enough hacking experience or knowledge to be any kind of authority on the topic. However, it does give me some ideas for things to search for (maybe on Google or youtube). Anyone else have any ideas on the topic, or experiences to share, please chime in.