Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Fragmentation offset"
From NetSec
TriciaNoonan (Talk | contribs) |
|||
(2 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
− | The fragmentation offset is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance. | + | The ''''fragmentation offset''' is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance. |
− | + | {{expand}} |
Latest revision as of 00:22, 8 August 2012
The 'fragmentation offset is the part of a packet header that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a packet fragmentation attack, this part of the header is used to tell the TCP/IP stack to overwrite the original packet header simulating packet injection on the target machine or appliance.
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|