Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Fragmentation offset"

From NetSec
Jump to: navigation, search
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
{{expand}}{{cleanup}}
+
The ''''fragmentation offset''' is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation.  During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance.
The fragmentation offset is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation.  During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance.
+
  
[[Category:Network Security]]
+
{{expand}}

Latest revision as of 00:22, 8 August 2012

The 'fragmentation offset is the part of a packet header that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a packet fragmentation attack, this part of the header is used to tell the TCP/IP stack to overwrite the original packet header simulating packet injection on the target machine or appliance.

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.