constantlylearning
Beta member
- Messages
- 1
- Location
- United States
During an ARP poisoning attack, what prevents the legitimate machine from responding first and negating the man-in-the-middle's attempt to spoof the victim's IP? Also, what prevents the victim from reasserting the correct MAC address/ip combination and "spoiling" the attempt?