In this type the attacker is on the same subnet as a victim. The sequence and acknowledgement numbers can be sniffed thereby eliminating the potential difficulty of calculating them accurately.
The biggest threat of spoofing in this instance would be session hijacking which is accomplished …