I am taking the SANS GCIH class, and we are talking about IP Spoofing and trust relationships. Is there a way to determine these relationships remotely? How does an attacker determine whether a system has these relationships? Please explain for both UNIX and Windows. The section seems to be focusing on NIX's but I assume trust relationships exist on windows, but if I remember correctly, these are mostly domain related in windows.