BLIND IP SPOOFING
Usually the attacker does not have access to the reply, abuse trust relationship between
hosts. For example: Host C sends an IP packet with the address of some other host
(Host A) as the source address to Host B.
Attacked host (B) replies to the legitimate host
(A).