Supposedly, you can supposedly trace MitM attacks with it. If you actually try this, would you forward the results to me? Possibly something for the security lab at school? Definitely a good project for CISSP certification: "How to trace MitM's".
No comments:
Post a Comment