This is a dedicated watch page for a single video.
Alex, an attacker with malicious intent, engages in a particular type of attack. In this scenario, Alex employs a technique where he manipulates and forges the sender's IP address to illicitly gain access to protected systems and confidential data. What type of attack is Alex executing in this situation?