 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
Goal is to
severely impair or disable a
|
|
|
host or its IP
stack
|
|
|
• |
Connects
address and port pair to itself
|
|
• |
Requires the
ability to spoof packet
|
|
|
source
addresses
|
|
|
• |
Requires the
victim’s network to be
|
|
|
unprotected
against packets coming
|
|
|
from outside
with own IP addresses
|
|