SLIDE 1
1
Reactions and Responses 1 IP Spoofing Stimuli Why would an - - PowerPoint PPT Presentation
Reactions and Responses 1 IP Spoofing Stimuli Why would an attacker spoof his source address? Hide the attackers activity nmap decoy option Hide the attackers identity To be able to view the responses, the attacker
1
2
3
4
5
6
7
Should be “RST- ACK”
8
9
10
11
12
13
14
15
16
17