This documentation discusses how an attacker can conduct an IP Spoofing attack. A spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another.
Get the Latest News & Insights
Sign up to get the latest security news affecting Linux and open source delivered straight to your inbox