What prevents this specific type of attack from being viable?
Imagine a user has an ip of 1.2.3.4
The server the user intends to connect to has an ip of 2.3.4.5
An attacker has a machine with a promiscuous network card on the user’s local network.
The attacker also has a server on a seperate network … Continue reading What prevents this specific type of attack from being viable?