(1. IP address spoofing attack? In order to gain access, the intruder/intruder generates a packet with a fake source address. For applications using IP-based authentication, this attack method can enable unauthorized users to gain access to the intended system, even with root privileges. Even if the response packet cannot reach the attacker, it will also damage the attacked target. This forms an IPSpoofing attack. 2. Land attack)