A technique used to forge the Media Access Control (MAC) address of a network device to bypass network filters, impersonate legitimate devices, or evade tracking.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free