Talk:TCP sequence prediction attack

What about faking port number
If I understand correctly to fake a TCP packet the attacker needs both the IP address and port number to be the same as the faked host, and then deals with sequence numbers. The same IP address is easy with NAT, but NAT does not allow the same port number for different hosts. Otherwise it cannot tell the packet is to which host. How does this fake both IP and socket number? Or does it have to be done by those controlling the routers Sohardtohavename (talk) 20:51, 10 March 2024 (UTC)