No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>


To have a better experience, please upgrade your IE browser.


FAQ-What Are the Meanings of Single-Packet Attacks

Publication Date:  2015-07-01 Views:  1691 Downloads:  0
Issue Description
What Are the Meanings of Single-Packet Attacks?
Land attack: TCP packets in which the source and destination IP addresses are the same or the source IP address is a loopback address

Ping of Death attack: ICMP packets contains more than 65,535 bytes (including the length of the IP header)

Large ICMP attack: ICMP packets larger than the specified value (4000 bytes by default, including the length of the IP header)

ICMP redirect attack: ICMP redirect packets (type 5).

ICMP unreachable attack: ICMP unreachable packets (type 3) whose code is not 4

Tracert attack: timeout ICMP packets (type 11) or destination-port unreachable ICMP packets (type 3 and code 3)

Fraggle attack: UDP packets whose destination port is 7 or 19

WinNuke attack: TCP packets with the destination port set to 139, the TCP URG tag set to 1, and the emergency pointer not empty and IGMP packets with the fragment flag set to 1 but the fragment offset is not 0

TCP flag attack: TCP packets in which all flag bits are set to 1 or 0, or the SYN and FIN bits are both 1s, or the RST and SYN bits are both 1s, or the FIN and URG bits are both 1s

IP fragment attack: IP packets in which the DF bit is 1 and MF bit is 1 or fragment offset is not 0, or the DF bit is 0 and the sum of the fragment offset and length is more than 65,535 bytes