ISC Exam Questions

What attack is primarily based on the fragmentation implementation of IP and large ICMP packet size?

What attack is primarily based on the fragmentation implementation of IP and large ICMP packet
size?

A.
Exhaustive

B.
Brute force

C.
Ping of Death

D.
Spoofing

Explanation:
Ping of Death — This exploit is based on the fragmentation implementation of IP
whereby large packets are reassembled and can cause machines to crash. ‘Ping of Death
takes advantage of the fact that it is possible to send an illegal ICMP Echo packet
with more than the allowable 65, 507 octets of data because of the way fragmentation is
performed. A temporary fix is block ping packets. Ideally, an engineer should secure
TCP/IP from overflow when reconstructing IP fragments.