Skip to main content
10 events
when toggle format what by license comment
Jul 27, 2014 at 5:30 audit First posts
Jul 27, 2014 at 5:30
Jul 7, 2014 at 12:28 comment added MDMoore313 @DanielBeck with all these Arduino's and clones connecting to the net now, I'm sure more nodes are vulnerable than we'd like to think.
Jul 4, 2014 at 17:04 comment added Daniel Beck @Dark_Cyber Right, that's why I wrote general type of attack. I hope nobody chokes on the original anymore…
Jul 4, 2014 at 17:01 comment added injector @DanielBeck You're referencing ICMPv6, which relates to IPv6. Not IPv4, which is what the OP was referencing, but thanks for the references. More information is always appreciated. It's good to know that vulnerability has also been mitigated for most modern OS's.
Jul 4, 2014 at 0:06 comment added kasperd The name Ping of Death is misleading, because the vulnerability is in how the last fragment is handled, and that doesn't even tell you what type of packet it is, since that is in the first fragment. If a host is vulnerable, you can attack it with any type of packet, as long as you send a corrupted last fragment. Also, this doesn't have anything to do with a DDoS attack. You don't need a distributed attack, when all you want to do is send one single corrupted packet. Finally, you can't reach 1MB with fragmented packets. The limit is 128KB in theory or 65.5KB in practice.
Jul 3, 2014 at 22:12 comment added Daniel Beck Current systems are still vulnerable to this general type of attack: ICMP ECHO REQUEST can cause a denial of service condition on the Juniper SSG20, Vulnerability in ICMPv6 could allow Denial of Service (Windows Vista-8, Server 2008 and 2012).
Jul 3, 2014 at 14:18 comment added injector You're referencing one Yahoo Answers post- therefore it must be true? We can agree to disagree. My comment still stands. Cheers and be well.
Jul 3, 2014 at 14:11 comment added MDMoore313 True, and I mentioned it's not as widespread as it used to be, however if you think every single piece of networking equipment is impervious to it, or that it isn't still used maliciously, you're sadly mistaken.
Jul 3, 2014 at 14:07 comment added injector Ah, the ol' Ping of Death (PoD) attack. Most modern OS's are no longer vulnerable to this type of attack. Also, most modern networking devices are no longer vulnerable to this type of attack. Of note, the original scenario which I based my question around, was that a single internal node was pinging it's gateway.
Jul 3, 2014 at 13:53 history answered MDMoore313 CC BY-SA 3.0