Assuming that you're directly attacking the wireless, then the answer is "no." This is because that wireless router is what the laptop is connecting to directly, and using as next hop to the rest of the network. You can, of course, change the MAC, as well as use a false hostname. Using a MAC of DE:AD:BE:EF:00:01 or something similar is always considered good form, although it is something of a giveaway. In fact, I know of at least two wireless IDS systems that look for the DEADBEEF string in MACs as a red flag.
Obviously, if you're attacking from the wired side, using TOR or another anonymizer, or even using local PC as a jumping off point might work.
However, the oldest trick in the attack book is to simply wipe the logs, which you would want to do in a real attack. Additionally, in a real attack you would want to disable the logging function after wiping it.
'Covering you tracks' is detailed in "Advanced 3vi1 1337 Hax0ring 201".