TCP Hijacking NAT 2 ← Previous Next → Figure 2 — Inferring the source port of the victim TCP connection.