Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Fragmentation offset"

From NetSec
Jump to: navigation, search
Line 1: Line 1:
{{expand}}{{cleanup}}
+
 
 
The fragmentation offset is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation.  During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance.
 
The fragmentation offset is the part of a [[packet header]] that defines the offset from the first packet at which to place the new data during TCP Fragmentation.  During a [[Packet Fragmentation Attack|packet fragmentation attack]], this part of the header is used to tell the TCP/IP stack to overwrite the original [[packet header]] simulating [[Packet Injection|packet injection]] on the target machine or appliance.
  
[[Category:Network Security]]
+
{{cleanup}}{{expand}}

Revision as of 04:51, 19 October 2011

The fragmentation offset is the part of a packet header that defines the offset from the first packet at which to place the new data during TCP Fragmentation. During a packet fragmentation attack, this part of the header is used to tell the TCP/IP stack to overwrite the original packet header simulating packet injection on the target machine or appliance.

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.