Question No : 204
Samuel, a professional hacker, monitored and Intercepted already established traffic
between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent
spoofed packets with Bob's IP address to the host machine. The host machine responded
with <| packet having an Incremented ISN. Consequently. Bob's connection got hung, and
Samuel was able to communicate with the host machine on behalf of Bob. What is the type
of attack performed by Samuel in the above scenario?
*