Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)
A . The attack is fragmented into groups of 16 octets before transmission.
B . The attack is fragmented into groups of 8 octets before transmission.
C . Short synchronized bursts of traffic are used to disrupt TCP connections.
D . Malformed packets are used to crash systems.
E . Publicly accessible DNS servers are typically used to execute the attack.

Answer: B, D

Explanation:

Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.

A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol documented Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission. However, when the target computer reassembles the malformed packet, a buffer overflow can occur, causing a system crash and potentially allowing the injection of malicious code.

Latest 350-701 Dumps Valid Version with 327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments