I was wondering, will the victim/gateway computer accept your spoof if it it doesn't send out a request and already has a cache of the gateway/victim?
Search:Type: Posts; User: ninjafish; Keyword(s): Search: Search took 0.15 seconds.
Results 1 to 1 of 1
|
|