Exploiting IP Fragmentation and Reassembly

4 important questions on Exploiting IP Fragmentation and Reassembly

What elements are added to an IP header to communicate reassembly instructions?

  1. IP identification
  2. More packet
  3. Fragmentation offset

What is happening in the teardrop attack?

The host computes the length of a packet incorrectly for overlaps, and therby exhausting its entire resources during reassembly.

What is happening in the ping of death attack?

Insufficient validation of the IP reassembly process. The maximum length of an IP packet (2^16bytes) can be overgrown when reassembling fragmented packets.
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What happens in the Rose attack?

An adversary will fill the buffer with a flood of packets all indicating more frames to follow that are never completed.

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo