Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Fragmentation"
From NetSec
GertieUbpgdd (Talk | contribs) |
|||
(One intermediate revision by one other user not shown) | |||
Line 4: | Line 4: | ||
In a [[Packet Fragmentation Attack]], the packet's [[fragmentation offset]] marking inside of the [[packet header]] overwrites the original packet header, ultimately changing any content inside of it (i.e. source ip, destination ip, source port, destination port, etc) to the attacker-supplied value. | In a [[Packet Fragmentation Attack]], the packet's [[fragmentation offset]] marking inside of the [[packet header]] overwrites the original packet header, ultimately changing any content inside of it (i.e. source ip, destination ip, source port, destination port, etc) to the attacker-supplied value. | ||
− | |||
− |
Latest revision as of 22:17, 19 May 2012
Packet fragmentation is generally used during high amount of data transfer.
Packets are chunked into multiple snippets of data in order to make sure that the packet can reach the target host in cases of high bandwidth usage.
In a Packet Fragmentation Attack, the packet's fragmentation offset marking inside of the packet header overwrites the original packet header, ultimately changing any content inside of it (i.e. source ip, destination ip, source port, destination port, etc) to the attacker-supplied value.