This document discusses IP spoofing attacks. It defines IP spoofing as pretending to be a different IP address than one's actual address in order to gain access or information. The document provides details on how IP spoofing works, exploiting flaws in the TCP/IP protocol by manipulating source addresses and sequence numbers to masquerade as a trusted system. It notes some common uses of IP spoofing include inspecting response packets and gaining unauthorized access to systems. The document also gives a brief history of IP spoofing and outlines the steps typically involved in an IP spoofing attack.