TCP Exploits We will discuss several exploits based on the design weaknesses of TCP. UDP Connectionless. Header is simple. Fake a UDP packet is easy. TCP Connection based.…