First page
Back
Continue
Last page
Overview
Graphics
Step 2: Observe spoofed packets and responses
Instructors use “tcpdump” to capture traffic on backbone.
Observe the spoofed packets, and responses to them.