This is a dedicated watch page for a single video.
A security analyst needs to determine the firewall's behavior by sending crafted packets to provoke specific responses. Which of the following methods would effectively bypass a stateful firewall during a penetration testing engagement?