MAC Spoofing – Keep victim out
I have successfully done a MAC Spoofing Attack on my open (ad-hoc) network using the macchanger tool (OS: Kali linux).
I would like to know what are the common techniques to keep the connection alive (so, the way to keep the… Continue reading MAC Spoofing – Keep victim out