Closed alimukarramm closed 5 years ago
Thanks for your kind words.
Wondering how can I use this tools with different subnets.
You can't.
Also, how come hacker know that specific IP is going to use that particular host.
This is a proof-of-concept meant for demonstration purposes, not for real hackers. This is all documented at length in the paper.
ok, thanks for your comments. Appreciate your swift response.
Hello, I am trying to use this tool in my corporate Network. Obviously, my Attacker/Victim/Host IPs are different. I tried to provide all the IPs but no success. Wondering how can I use this tools with different subnets. Also, how come hacker know that specific IP is going to use that particular host.
Thanks for your help and great work.
Regards.