How can spoofing a certain MAC address enable sending probe requests that I was never connected to?
I was wondering how could my computer that uses a spoofed MAC address be sending probe requests for APs that I was never connected to?
Note:- The other computer with the original MAC address was shut down.