In which of the following attacks does an attacker send a spoofed TCP SYN packet in which the target’s IP address is filled in both the source and destination fields?