Vous êtes sur la page 1sur 3

PING OF DEATH

Marsella Arisia
BINA NUSANTARA INTERNATIONAL
marsella.arisia@yahoo.com

ABSTRACT
Ping (Packet Internet Groper) is a utility program used to check network connectivity based on
Transmission Control Protocol (TCP) or Internet Protocol (IP) technology. By using this utility,
we can test whether a computer connected to other computers. This is done by sending a packet
to the IP address to test the connectivity and waits for a response from the packets. If the ping
utility shows positive results then both computers are connected to each other on a network.
Ping is not only used to check whether computers are connected to other computers, it is also
used to attack a computer or even a network. This process leads us to what so called “Ping of
Death”. Ping of Death is an attack that sends Internet Control Message Protocol echo request
packet (Ping) in large size with the purpose of making the input buffer on the destination
network become overloaded and eventually make the network error.
Keywords: Ping, Ping of death

I.
II. INTRODUCTION

IP has maximum number of packets that can packets that has been split, a buffer overflow
be received, when it handle ping packets that may occur, and this which often cause
is larger than 65.536 byte, it may caused system crashes.
damage on the computer. Ping of death is an III. MORE ABOUT PING OF
attack that uses this system, it involves DEATH
sending the wrong overloaded ping and
One of the features of the TCP / IP is
harmful to the target computer. The attack
fragmentation that allows one IP packet to
exploits the way ping program by sending a
be broken up into smaller segments.
large size packet (more than 65.535 bytes) to
Attackers started to use that feature when
the destination system or computer. Some
they discovered that a package is split into
computer or network will hang when it is
fragments that can add up to more than
attacked by this way. In general, sending
65,536 bytes are allowed. Many operating
65.535 bytes of ping packets is illegal
systems do not know what to do when they
according to the network protocol, but such
receive a large package they can be froze,
a package could be sent if the package has
crashed, or rebooted.
been broken, when the target arrange the
only limited to ping but also other things
Ping of death attacks especially dangerous that send IP datagram. TCP, UDP and IPX
because the identity of the attacker that can affect the machine tremendously. A
sends a large packet can easily fake, and firewall blocking a ping is a temporally fix.
because the attacker does not need to know The sole solution to combat ping issues is to
anything about the machines or computers secure the kernel of the overflow when the
they attack except for its IP address. reconstruction IP fragments. But blocking
ping will only secure one part of the
problem; damage can still be carried out
through NFS, Telnet, http, and all other
IV. CAUSED OF CRASH ports within the system that is exposed.

It is important to remind us that sending an


illegal packet with more than 65.535 bytes
Operating system vendors have made a
of data is possible because of the way of
patch available to avoid the ping of death.
destruction packet can be done. This process
However, many Web sites continue to block
of destructing packets can be called
Internet Control Message Protocol (ICMP)
fragmentation. The fragmentation relies on
ping messages of their firewalls to prevent
an offset value in each fragment to
variations in the future this kind of denial of
determine where the individual fragment
service attack.
goes upon reassembly. As a result on the last
fragment, it is possible to combine a valid
V. TO PREVENT PING OF
offset with a suitable fragment size like
DEATH
“offset + size” is larger than 65535 bytes.
Since typical computers or machines don't If there is no patch available, and your main
process the packet until they have all problem afraid of pings from users outside
fragments and have tried to reassemble it, your network, the best solution is a quick fix
there is the possibility for overflow of 16 bit on the firewall blocking the ping. This is not
internal variables, which can lead to system a long-term solution. If you have any detect
crashes, reboots or ever freezing. services or listeners on any port at all, they
are prone to problems.

It can be easy to lose the root of the problem


It is possible that sooner or later, someone
when referring to ping. The problem is not
will come out with a program that will send attackers able to perform this
invalid packets to a web server, an FTP port. attack in a system, most likely
The only solution is to patch your operating the system will crash.
system. By blocking the ping, you prevent
people from your side at all. This might VII. LESSON LEARNED
even solve some of the things that depend on In order to prevent this type of attacks,
the ping. A better solution than blocking all the administrator will need to
pings is to block only the fragmented. This install firewall at the router and
will allow your normal 64 byte ping through limit the port opened so that the
in almost all systems, while blocking packets cannot be send easily.
anything larger than the maximum
transmission unit size of the link. VIII. REFERENCES
http://en.wikipedia.org/wiki/Ping_of_de
ath
VI. CONCLUSION
http://en.wikipedia.org/wiki/Ping
Ping of death is one of the attacks that
frequently use by attackers in the http://www.sans.org/tysonscorner07/des
present time and it’s one of the cription.php?cid=1043
hardest type of attack that is
http://www.sans.org/silverspring06/des
difficult to be anticipated. If an cription.php?cid=1043

Vous aimerez peut-être aussi