• Natanael
    link
    fedilink
    English
    16 months ago

    These types of attacks would likely be implemented via DHCP spoofing / poisoning, unless you’re on a malicious network