Académique Documents
Professionnel Documents
Culture Documents
Marsella Arisia
BINA NUSANTARA INTERNATIONAL
marsella.arisia@yahoo.com
ABSTRACT
Ping (Packet Internet Groper) is a utility program used to check network connectivity based on
Transmission Control Protocol (TCP) or Internet Protocol (IP) technology. By using this utility,
we can test whether a computer connected to other computers. This is done by sending a packet
to the IP address to test the connectivity and waits for a response from the packets. If the ping
utility shows positive results then both computers are connected to each other on a network.
Ping is not only used to check whether computers are connected to other computers, it is also
used to attack a computer or even a network. This process leads us to what so called “Ping of
Death”. Ping of Death is an attack that sends Internet Control Message Protocol echo request
packet (Ping) in large size with the purpose of making the input buffer on the destination
network become overloaded and eventually make the network error.
Keywords: Ping, Ping of death
I.
II. INTRODUCTION
IP has maximum number of packets that can packets that has been split, a buffer overflow
be received, when it handle ping packets that may occur, and this which often cause
is larger than 65.536 byte, it may caused system crashes.
damage on the computer. Ping of death is an III. MORE ABOUT PING OF
attack that uses this system, it involves DEATH
sending the wrong overloaded ping and
One of the features of the TCP / IP is
harmful to the target computer. The attack
fragmentation that allows one IP packet to
exploits the way ping program by sending a
be broken up into smaller segments.
large size packet (more than 65.535 bytes) to
Attackers started to use that feature when
the destination system or computer. Some
they discovered that a package is split into
computer or network will hang when it is
fragments that can add up to more than
attacked by this way. In general, sending
65,536 bytes are allowed. Many operating
65.535 bytes of ping packets is illegal
systems do not know what to do when they
according to the network protocol, but such
receive a large package they can be froze,
a package could be sent if the package has
crashed, or rebooted.
been broken, when the target arrange the
only limited to ping but also other things
Ping of death attacks especially dangerous that send IP datagram. TCP, UDP and IPX
because the identity of the attacker that can affect the machine tremendously. A
sends a large packet can easily fake, and firewall blocking a ping is a temporally fix.
because the attacker does not need to know The sole solution to combat ping issues is to
anything about the machines or computers secure the kernel of the overflow when the
they attack except for its IP address. reconstruction IP fragments. But blocking
ping will only secure one part of the
problem; damage can still be carried out
through NFS, Telnet, http, and all other
IV. CAUSED OF CRASH ports within the system that is exposed.