Is the perfect MITM attack possible?
Let’s imagine a data link layer level MITM attack. Is it possible to fulfill all of the following points?
you completely hide your identity by forging your own MAC address
you create malformed packets, so the router doesn’t even know you … Continue reading Is the perfect MITM attack possible?