Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Fragmentation offset"
From NetSec
TriciaNoonan (Talk | contribs) |
|||
Line 1: | Line 1: | ||
+ | {{expand}}{{cleanup}} | ||
The fragmentation offset is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance. | The fragmentation offset is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance. | ||
[[Category:Network Security]] | [[Category:Network Security]] |
Revision as of 00:24, 19 October 2011
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
The fragmentation offset is the part of a packet header that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a packet fragmentation attack, this part of the header is used to tell the TCP/IP stack to overwrite the original packet header simulating packet injection on the target machine or appliance.