Step 1: Packet Crafting: The attacker crafts a TCP SYN packet.
Step 2: Identical Source/Destination: The crafted packet is configured with the same source and destination IP address and port number.
Step 3: Packet Transmission: The attacker sends the malformed packet to the target system.
Step 4: Target Processing: The target system receives the packet and attempts to process it.
Step 5: Resource Exhaustion: The target system, due to the identical source and destination, enters a state of resource exhaustion, potentially leading to a denial of service.