by Andrew N
I would like to see this is action someday and of course it would be for educational purposes. Learning how to defend yourself from such event is another question. The journal entry did explain ways such as check for vendor specific address and make sure they are matching, but of course MAC addresses can be changed so that can’t be the only thing to rely on. They say checking for network traffic through other programs for gratuitous amount of addresses would be another way.