Quote:
Originally Posted by rkruz
Legitimate uses of MAC spoofing
An example of a legitimate use of MAC spoofing is hanging the function of a single computer from a router to computer and back to router through MAC spoofing.
|
One example, but very different to what you were suggesting earlier.
Let's see you make a valid case for a 'sniffer'