An attacker is attempting to Telnet to a specific host secured behind a firewall rule that only allows inbound connections on TCP port 25. What aspect of RFC 791 (Internet Protocol) can the attacker exploit to perform this attack?
A.
Send packets with a fragmentation offset of 20 and a TCP destination port 25. All subsequent packets will overwrite the IP header allowing a new IP header to be inserted.
B.
Send a SYN/ACK to the host on TCP port 23 indicating a response to a SYN request from the host on the secure side of the firewall.
C.
Send two packets, the first packet with the DF bit clear and the MF bit set, and the second packet with a fragmentation offset of 1 and a destination port of TCP 23.
D.
Send packets destined for TCP port 23 with the DF and MF bits clear and the fragment offset to 0 since many firewalls will pass IP fragments with a 0 offset
E.
Set the TOS bits to 1111 1100 indicating a network control packet that should be forwarded to the host with high reliability (no discard)