EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: A
The Ping of Death attack involves exploiting the ICMP protocol and IP fragmentation. Here’s a quick overview of how it works:
The attacker sends an ICMP (ping) packet that is larger than the maximum allowed size of 65,535 bytes.
This oversized packet gets fragmented into multiple, smaller packets by the attacker’s system before sending.
The receiving system tries to reassemble these fragments back into the larger packet.
The reassembly process fails because the packet exceeds the maximum size, causing the system to crash or freeze.