In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article mainly explains "what is a death Ping attack". The content in the article is simple and clear, and it is easy to learn and understand. Please follow the editor's train of thought to study and learn "what is a death Ping attack".
The Dead Ping attack is a denial of service (DoS) attack in which the attacker aims to destroy the target computer by sending packets larger than the maximum allowable size, thus causing the target computer to freeze or crash. Primitive death Ping attacks are not common these days. Related attacks, known as ICMP flood attacks, are more common.
How does the Ping of death work?
The Internet Control message Protocol (ICMP) echo reply message or "ping" is a network utility used to test network connectivity and works like sonar-emitting a "pulse" that tells the operator about the environment. If the connection is normal, the source computer receives a reply from the destination computer.
Although some ping packets are very small, IPv4 ping packets are much larger and can reach a maximum allowable packet size of 65535 bytes. Some TCP/IP systems have never been designed to handle packets larger than the maximum, making them vulnerable to packets larger than that size.
When a malicious big data packet is transmitted from the attacker to the target, the packet is divided into multiple segments, each of which is below the maximum size limit. When the target computer tries to put these parts back together, the total exceeds the size limit, and a buffer overflow may occur, causing the target computer to freeze, crash, or restart.
Although ICMP echo can be used for this attack, anything that sends an IP Datagram can be used for this vulnerability. These include TCP, UDP, and IPX transmissions.
How to protect against Ping DDoS attacks of death?
One solution to prevent attacks is to add checks to the reorganization process to ensure that the maximum big data packet size limit is not exceeded after packet reorganization. Another solution is to create a memory buffer with enough space to handle packets that exceed the maximum value of the guidelines.
Most of the original dead Ping attacks are extinct; devices produced after 1998 usually prevent such attacks. Some old devices may still be vulnerable. A new type of dead Ping attack against Microsoft Windows IPv6 packets was recently discovered and patched in mid-2013. Cloudflare DDoS guard mitigates a dead Ping attack by discarding malformed packets before they reach the target host computer.
Thank you for your reading, the above is the content of "what is a death Ping attack". After the study of this article, I believe you have a deeper understanding of what is a death Ping attack, and the specific use needs to be verified in practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.