Somewhere in the internet I saw promiscuous mode of networking is used by hacker but is there any use case in which it becomes mandatory to change the mode of network interface in promiscuous mode ?