Security Basics mailing list archives

Re: Help Needed


From: Matt Taylor <mtaylor () clippercitynetworks com>
Date: 09 Mar 2004 21:05:57 -0500


Packet Fragmentation is the key:

http://www.insecure.org/sploits/ping-o-death.html


On Tue, 2004-03-09 at 12:40, harry wrote:
John Kingston wrote:
From Windows 2000:

Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
            [-r count] [-s count] [[-j host-list] | [-k host-list]]
            [-w timeout] destination-list

Options:
    -t             Ping the specified host until stopped.
                   To see statistics and continue - type Control-Break;
                   To stop - type Control-C.
    -a             Resolve addresses to hostnames.
    -n count       Number of echo requests to send.
    -l size        Send buffer size.
    -f             Set Don't Fragment flag in packet.
    -i TTL         Time To Live.
    -v TOS         Type Of Service.
    -r count       Record route for count hops.
    -s count       Timestamp for count hops.
    -j host-list   Loose source route along host-list.
    -k host-list   Strict source route along host-list.
    -w timeout     Timeout in milliseconds to wait for each reply.

So:
ping -l 65000 IPADDRESS will ping that IPADDRESS with 65000 bytes of data.

not always... there mostly are limitations in clients that limit icmp 
packets to 16 bits (65535)... but there are other implementations of 
ping which allow bigger packets, suitable for a ping of death...

(please, i'm new here... correct me if i'm wrong or do something wrong)

greetings
-- 

Attachment: signature.asc
Description: This is a digitally signed message part


Current thread: