Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Fragmentation"

From NetSec
Jump to: navigation, search
 
Line 5: Line 5:
 
In a [[Packet Fragmentation Attack]], the packet's [[fragmentation offset]] marking inside of the [[packet header]] overwrites the original packet header, ultimately changing any content inside of it (i.e. source ip, destination ip, source port, destination port, etc) to the attacker-supplied value.
 
In a [[Packet Fragmentation Attack]], the packet's [[fragmentation offset]] marking inside of the [[packet header]] overwrites the original packet header, ultimately changing any content inside of it (i.e. source ip, destination ip, source port, destination port, etc) to the attacker-supplied value.
  
[[Category:Network Security]] [[Category:Information]]
+
[[Category:Network Security]]

Revision as of 04:40, 16 May 2012

Packet fragmentation is generally used during high amount of data transfer.

Packets are chunked into multiple snippets of data in order to make sure that the packet can reach the target host in cases of high bandwidth usage.

In a Packet Fragmentation Attack, the packet's fragmentation offset marking inside of the packet header overwrites the original packet header, ultimately changing any content inside of it (i.e. source ip, destination ip, source port, destination port, etc) to the attacker-supplied value.