Fragment Overlap Attack
¨Manipulates the fragment offset field of the IP header
¨Each IP packet is fragmented into to packets
¨First fragment contains TCP port number of a harmless service not closely monitored ¨Second fragment has an offset value so small that the fragments overlap during reassembly