Computer NetworksNETWORKS

#4 How to use Variables & Strings || MAC Changer || Python for Ethical Hacking || S.M. Security

Title : #4 How to use Variables & Strings || MAC Changer Python for Ethical Hacking || S.M. Security

In previous video we create a simple MAC Changer tool but in that we have to change new MAC address and interface every time for use. To solve this we use variables to save the changeable details and change that variable only
This is an introduction video only In next video we will use variables inside subprocess

MAC Changer #1: https://youtu.be/bUIM7cFmpA8
MAC Changer #2: https://youtu.be/UqOVrWn3ex0
MAC Changer #3: https://youtu.be/OxjPpqgmonY
MAC Changer #4: https://youtu.be/dZhG-C_kDuc
MAC Changer #5: https://youtu.be/FGwFyZCeVAU
MAC Changer Playlist: https://www.youtube.com/watch?v=UqOVrWn3ex0&list=PLH8OQ1IXtFKCHzGICTk5epFGiL1tPTsvn

Blog : https://sm-security.blogspot.com/
Theory : https://sm-security.blogspot.com/2020/12/4-variables-mac-changer-python-for.html

Disclaimer :
This Channel does not promote (or) encourage any illegal activities , all contents provided in This channel (S.M. Security) is meant for EDUCATIONAL PURPOSE Only
We do all the things in our own system do not hack any device without its owner permission.It is illegal so they can file a complaint on you and put you in jail.
In this channel we will tell you about Penetration Testing, Ethical hacking, Cyber Security, Programming Languages (Especially Python) and so on

If you like this vide Give me a Thumbs up
Share this video to your friends if they need it
Subscribe My Channel for future update

source

mac address

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

Leave a Reply

Your email address will not be published. Required fields are marked *