No it doesn't. Watch the video. It creates a clone of your network and tricks the victim's software stack to connect into it.
No it doesn't. Watch the video. It creates a clone of your network and tricks the victim's software stack to connect into it.