Remotely Stopping Services via Malformed Packet DOS Attacks(cont.)
¨Teardrop, Newtear, Bonk, Syndrop
–Sends overlapping IP packet fragments, causing TCP/IP stacks of vulnerable machines to crash
¨Winnuke
–Sends garbage data to an open file sharing port (TCP port 139) on a Windows machine, causing the vulnerable machine to crash since data does not conform to SMB protocol
¨Targa http://packetstorm/security.com/Dos/
–Contains a suite of malformed packet DOS attacks
¨ARP spoofing to poison router’s ARP cache using DSniff