“Teardrop”, “Bonk”, “Boink”, “Ping of Death”
Goal is to severely impair or disable a host or its IP stack
Use packet fragmentation and reassembly vulnerabilities
Require that a host IP stack be able to receive a packet from an attacker
Previous slide
Next slide
Back to first slide
View graphic version