This is a relatively outdated form of attack that poses a threat to desktop computers running some of the older and more vulnerable versions of operating systems.
The tools through which such an attack is implemented use the known vulnerabilities of these systems. The principle of these attacks is that the attacker sends fraudulent or damaged packets to the destination computer, typically ICMP packets. As a result, there is a significant slowdown or halt of critical system processes, resulting in a system crash, which is represented by a blue death screen in earlier versions of the Windows operating system.
Programs called Nukes are freely available on the Internet and, due to their simplicity, they can be used by a complete beginner. After running a program, it’s enough to enter the IP address of the target computer and then just wait for this computer to crash. This happens, however, only if the victim’s computer is vulnerable to the misuse of the program.