Click here to Skip to main content
12,815,616 members (39,916 online)
Rate this:
Please Sign up or sign in to vote.
See more: VB VB.NET
I'm a final year student. i wanna develop an software application using to trace intruders mac address and block them. i'm still on planning phase but i still need to investigate on how to develop this application.

please don't laugh at me. i'm totally newbie
Posted 11-Oct-12 22:36pm
Rate this: bad
Please Sign up or sign in to vote.

Solution 1

There are a few problems with this: mostly related to how things work.
Firstly it is not difficult to spoof a MAC address (i.e. pretend to be a different one).
Secondly, MAC addresses generally do not carry past the first router they meet - from that point on they acquire the MAC address of the router, and the original is retained in the router address translation table.

So relying on this as a protection method is generally counter productive - it gives a false feeling of safety.

AFAIK there is no direct way to get the current remote MAC - you would have to query the Router routing table, and it's not a simple job, as it will vary from model to model, and manufacturer to manufacturer.
Oneraz 12-Oct-12 4:04am
Would u suggest me other way?
Dave Kreskowiak 12-Oct-12 12:17pm
Other way for what??
Rate this: bad
Please Sign up or sign in to vote.

Solution 2

So if you just want to demonstrate the functionality of some kind of security system with your project. You can try following.

Either create a VB.Net Web Application or create a Socket based Client-Server Application.

Where Server/Web Application will allow users to upload text files (.txt) to the server.

Now if a user tries to upload an .exe file, then cancel the connection and show the message of invalid file type. and then add the IP Address of the client to 'Black List' table in database.

And every time before starting upload check the table if the current IP Address is found in the table, if found disconnect and show the message 'You IP Address has been black listed for invalid attempts'.

and then try to upload a .txt file from another computer, and the server will not have that IP Address in the black list table so it will allow the connection.

and try again from the previous computer and it will not allow it.

This way you can demonstrate the basic idea of detecting intruder and blocking further access. and if you do not want this and want to do a real life application. as I said in the Lounge[^], you need to define what is Intruder means. after that it is easy to add the IP Address to Firewall.

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

    Print Answers RSS
Top Experts
Last 24hrsThis month

Advertise | Privacy | Mobile
Web02 | 2.8.170308.1 | Last Updated 12 Oct 2012
Copyright © CodeProject, 1999-2017
All Rights Reserved. Terms of Service
Layout: fixed | fluid

CodeProject, 503-250 Ferrand Drive Toronto Ontario, M3C 3G8 Canada +1 416-849-8900 x 100