We know that when an ARP spoofing process is running on a network, all of the network traffic will be routed through it before it travels to its true destination.
But what happens if I have 2 ARP spoofing processes running on a network? My gut says that this is reasonable and the network should continue to work. I'm also guessing that the second process to start gets first crack at the data on the network.
So what do you think? Is this correct or does something else happen?