Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you want to go a step further, you can also use some more nefarious tools to gather mac addresses of clients on the paid network, spoof them and steal their connection. Not that I've ever done that.


I’ve always been curious about this. What happens when that other authorized MAC is also attempting to connect?


I've done that many years ago on a college campus that required you to log in via your student ID on a captive page.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: