Figure 8.16
Spoofing attack against Unix trust
relationships