It runs very unstable, captures session, through the times. Until you identify patterns, so I describe the most obvious downside:
1. After the termination of the arp spoofing-purpose cache is not updated real mac-th gateway for some time. On the contrary, at the start of spoofing mac gateway is replaced by the moment. It would be logical to do after the cessation of spoofing arp-reply indicating the real-mac-and gateway to restore a connection of the victim.
2. Connect the victims after the cessation of spoofing is not restored even after the appearance in its arp-cache real-mac-and gateway. From victim to an IP gateway fails, even ping. Treated reboot gateway (common wi-fi router zte). At the same time, the device with intercepter-th has no problems with the Gateway to connect to.
Configuration is as follows: the victim - Win7, cable connected to a router, an attacker - Nexus 7 Android 4.2.1 is connected via wi-fi.
P.S. Protesters spoofing on dsploit and droidsheep - after the termination of a connection spufa goal restored.
P.P.S. Page with sessions during normal surfing very quickly clogged with identical records, they would be grouped.
Post has been editedsysanin.by - 19.12.12, 01:10Reason for editing: additional info