Here, the attacking computer takes the IP address of the client. The server continues communicating with the attacker, unaware of this.