First page Back Continue Last page Overview Graphics

Step 2: Observe spoofed packets and responses