Watch this video on YouTube
A cybersecurity professional is evaluating the vulnerability of an ICS to packet spoofing. Which tool is most suitable for crafting and sending custom packets to test the system's resilience?