Arguably you want to spoof the address/es of someone else you want also want to attack as the return address so that the person you attack starts responding to that address and I directly flooding them, particularly if you’re trying to DoS something like Twitter.
Arguably you want to spoof the address/es of someone else you want also want to attack as the return address so that the person you attack starts responding to that address and I directly flooding them, particularly if you’re trying to DoS something like Twitter.