Profile photo for Terry Lambert

This is not a road you want to go down.

Contrary to the other answers, the MAC is loaded from firmware into a device register, and it’s possible to reload the device register with a different value, after the hardware POSTs (Power On Self Tests), which is how it gets from firmware to the register in the first place.

This presumes there is either an API, or that you have the ability to write to the hardware bus, which is a protected operation in Windows 10, since it had to take place as a trap to Ringo 0.

The code you are allowed to run in Ring 0, is protected by code signing in Windows 10, which means that in order to do the write, the existing driver has to expose an API, or you need a signed driver to do it.

As a practical matter, then, you will need to find a way to run arbitrary code in Ring 0, without triggering the signature mechanism.

This is a “level 3 hack”.

Meaning it’s possible with a Ring 0 code injection attack on the OS itself.

It’s possible, in other words, and does not require a high degree of sophistication to accomplish.

What is your specific need, outside of the developer process, which would allow you to do this without an exploit that got you to Ring 0 in Windows 10?

View 2 other answers to this question
About · Careers · Privacy · Terms · Contact · Languages · Your Ad Choices · Press ·
© Quora, Inc. 2025