Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
A. Teardrop
B. SYN flood
C. Smurf attack
D. Ping of death
2 Comments on “Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality ”
miguelsays:
A
Joshua Dreifreundsays:
Ping of death can use also fragmentation, but the actual weakness is in handling oversized ICMP packets. Teardrop is exploits a specific weakness in the reassembly of overlapping fragments.
A
Ping of death can use also fragmentation, but the actual weakness is in handling oversized ICMP packets. Teardrop is exploits a specific weakness in the reassembly of overlapping fragments.
A is the best answer.