Contact sales: +420 226 801 710
  • cs
  • en

Ping of Death Attack

 

 

Although this type of attack may seem practically inapplicable today, it is worth mentioning. In this case, the attacker uses TCP/IP implementations to misuse Ping, a network utility used to verify that a remote computer is working and communicating. In the past, many systems could not handle a ping of more than 65,535 bytes, which is the maximum packet size in the IP protocol. An attempt to process an abnormally large packet typically caused an error that subsequently led to a failure in a system not resilient to such bad packets. The attacker’s identity could easily be falsified, and the attacker did not even need detailed knowledge of the operating system of the victim’s computer attacked, the IP address being enough. Ping of Death Attack attacks usually do not cause a system to collapse, but may slow it down significantly. In the recent past, a new type of Ping of Death attack, known as Ping Flood, has emerged. The attack occurs so that the attacker sends the ICMP packets at a fast ping speed without waiting for an answer. If the victim tries to answer, the outbound communication of the target line becomes overloaded. These attacks usually run through botnets and are often relatively massive DDoS attacks.

Is your website protected against an DDoS attack?

Consult the possibilities of protecting against DDoS attacks with our specialists. We will propose to you the most suitable solution that will fully meet your needs.

Is your website protected against an DDoS attack?

Consult the possibilities of protecting against DDoS attacks with our specialists. We will propose to you the most suitable solution that will fully meet your needs.

system_white