<br><font size=2 face="sans-serif">I can speak with experience that a lot
of switches/routers do not like spoofed macs.. I'm working with a product
right now that a customer used in a way we didn't expect.. What he did
was spoof his source mac as a flood broadcast so our product flood broadcast
responses. Mind you these are raw ethernet packets, not IP or any other
known protocol. It works fine in their lab, but I can't find a switch
in my lab that allows this.. I had to find a hub to test it.</font>
<br>
<br><font size=2 face="sans-serif">John</font>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td width=40%><font size=1 face="sans-serif"><b>inter inter <intercepter.mail@gmail.com></b>
</font>
<br><font size=1 face="sans-serif">Sent by: winpcap-users-bounces@winpcap.org</font>
<p><font size=1 face="sans-serif">07/19/2010 06:39 AM</font>
<table border>
<tr valign=top>
<td bgcolor=white>
<div align=center><font size=1 face="sans-serif">Please respond to<br>
winpcap-users@winpcap.org</font></div></table>
<br>
<td width=59%>
<table width=100%>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td valign=top><font size=1 face="sans-serif">winpcap-users <winpcap-users@winpcap.org></font>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td valign=top>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td valign=top><font size=1 face="sans-serif">[Winpcap-users] spoofed mac
address</font></table>
<br>
<table>
<tr valign=top>
<td>
<td></table>
<br></table>
<br>
<br>
<br><font size=3>it works well via ethernet swtich. looks problem in wifi
driver or card itself.</font><font size=2><tt>_______________________________________________<br>
Winpcap-users mailing list<br>
Winpcap-users@winpcap.org<br>
https://www.winpcap.org/mailman/listinfo/winpcap-users<br>
</tt></font>
<br>