We will exploit this rule to perform de-auth attacks later. A device will only receive data that has destination MAC as its address. To send a packet in a network, the packet should have a source MAC address and a destination MAC address.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |