The maximum packet size allowed to be transmitted by TCP/IP on a network is 65536(2^16-1) bytes.
In the Ping of Death (POD) Attack, a packet having a size greater than this maximum size allowed by TCP/IP, is sent to the target system. As soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs.
This attack can easily be executed by the ‘ping’ command as follows:
If your system is still vulnerableb to this attack, it will crash upon running this command:
In the Ping of Death (POD) Attack, a packet having a size greater than this maximum size allowed by TCP/IP, is sent to the target system. As soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs.
This attack can easily be executed by the ‘ping’ command as follows:
ping -l 65540 hostnameThis exploit has affected a wide variety of systems, including Unix, Linux, Mac, Windows, printers, and routers. However, most systems since 1997-1998 have been fixed, so this bug is mostly historical. The only solution is to secure the kernel against overflow when reconstructing IP fragments.
If your system is still vulnerableb to this attack, it will crash upon running this command:
ping -l 65510 your.host.ip.address
No comments:
Post a Comment