Also known as a TCP reset attack, RST packet spoofing exploits a feature of the Transmission Control Protocol (TCP) that allows unwanted connections to be closed without confirmation. It can be used to disrupt a wide range of Internet-based applications.