Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Fragmentation offset"
From NetSec
| (One intermediate revision by one other user not shown) | |||
| Line 1: | Line 1: | ||
| − | + | The ''''fragmentation offset''' is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance. | |
| − | The fragmentation offset is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance. | + | |
| − | + | {{expand}} | |
Latest revision as of 00:22, 8 August 2012
The 'fragmentation offset is the part of a packet header that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a packet fragmentation attack, this part of the header is used to tell the TCP/IP stack to overwrite the original packet header simulating packet injection on the target machine or appliance.
| This article contains too little information, it should be expanded or updated. |
|---|
Things you can do to help:
|