“Teardrop”, “Bonk”, “Boink”,
“Ping of Death”
Goal is to severely impair or disable a
host or its IP stack
Use packet fragmentation and
reassembly vulnerabilities
Require that a host IP stack be able to
receive a packet from an attacker