Search



Categories

News

Videos

Underground

Vblogs

Hacking Challenges

Ping of Death

March 6th, 2009 by Patchy
I decided to do a video on the Ping of Death because a lot of people just starting out in hacking have heard of it, but don’t know exactly want it is. Also, they still believe it is a useful attack today. You can go on Youtube and watch tons of videos of kids making batch files that send pings with random payload sizes; however, this is horribly incorrect. The Ping of Death basically crashes a computer by sending a ping (aka ICMP ECHO request) with a packet greater than 65,535 bytes, and the reason this causes problems is because an IP packets can only be up to 65,535 bytes long. Packets that are bigger than the maximum size are fragmented into smaller packets, which are then reassembled by the receiver. Typically, machines don’t process the packet until all fragments have been received. When the machine tries to reassemble the packet it causes an overflow in internal variables, which can lead to a system crash. Some vulnerable operating systems are Windows 95, Windows NT, Windows 3.11, MSDOS, Mac OS 7, Solaris (x86) 2.4 & 2.5, and Linux versions <= 2.0.23. Modern Operating Systems are not vulnerable to the Ping of Death! Also, in this video I explain the popular Smurf Denial of Service Attack, and I rant about Windows 95. Full Scale Video Here
Download Here

Source: http://insecure.org/sploits/ping-o-death.html

Posted in Vblog | 5 Comments »

5 Responses

  1. slicer45 Says:

    lol Patchy sounded like you where like pissed off that day.

  2. overide Says:

    Patchy tell us how you really feel about windows 95

  3. livid86 Says:

    Just digging up windows 95 now to give it a shot..

    I might install it over ubuntu and windows xp because of how much you seem to love it!

    Thanks

  4. Futurix Says:

    seriously Win95 deserves a rant like that

  5. CrashOverron Says:

    lmfao little rant there was amazing…surprisingly enough i know of a DR. office in my area taht uses Win95 on their computers throughout their network…security issue?

You must be logged in to leave a comment.