Click here to Skip to main content
15,868,340 members
Please Sign up or sign in to vote.
1.00/5 (2 votes)
See more:
I'm a final year student. i wanna develop an software application using vb.net to trace intruders mac address and block them. i'm still on planning phase but i still need to investigate on how to develop this application.

please don't laugh at me. i'm totally newbie
Posted

There are a few problems with this: mostly related to how things work.
Firstly it is not difficult to spoof a MAC address (i.e. pretend to be a different one).
Secondly, MAC addresses generally do not carry past the first router they meet - from that point on they acquire the MAC address of the router, and the original is retained in the router address translation table.

So relying on this as a protection method is generally counter productive - it gives a false feeling of safety.

AFAIK there is no direct way to get the current remote MAC - you would have to query the Router routing table, and it's not a simple job, as it will vary from model to model, and manufacturer to manufacturer.
 
Share this answer
 
Comments
Oneraz 12-Oct-12 4:04am    
Would u suggest me other way?
Dave Kreskowiak 12-Oct-12 12:17pm    
Other way for what??
So if you just want to demonstrate the functionality of some kind of security system with your project. You can try following.

Either create a VB.Net Web Application or create a Socket based Client-Server Application.

Where Server/Web Application will allow users to upload text files (.txt) to the server.

Now if a user tries to upload an .exe file, then cancel the connection and show the message of invalid file type. and then add the IP Address of the client to 'Black List' table in database.

And every time before starting upload check the table if the current IP Address is found in the table, if found disconnect and show the message 'You IP Address has been black listed for invalid attempts'.

and then try to upload a .txt file from another computer, and the server will not have that IP Address in the black list table so it will allow the connection.

and try again from the previous computer and it will not allow it.

This way you can demonstrate the basic idea of detecting intruder and blocking further access. and if you do not want this and want to do a real life application. as I said in the Lounge[^], you need to define what is Intruder means. after that it is easy to add the IP Address to Firewall.
 
Share this answer
 
v2

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)



CodeProject, 20 Bay Street, 11th Floor Toronto, Ontario, Canada M5J 2N8 +1 (416) 849-8900