Fragmentation6

Description

Fragmentation6 – Performs fragment firewall and implementation checks, incl. denial-of-service.

Below is the main principle of the attacks in fragmentation6 .
ATTACK Firewall 1 – resending fragments with different data within stream (2nd real)
Sending first fragment
Sending second fragment with fake data and ttl=1
Sending duplicate second fragment with real data and ttl=64
Sending third and final fragment
ATTACK Firewall 2 – resending fragments with different data within stream (1st real, 2nd ttl 1)
Sending first fragment
Sending duplicate second fragment with real data and ttl=64
Sending second fragment with fake data and ttl=1
Sending third and final fragment
ATTACK Firewall 3 – resending fragments with different data within stream (1st real)
Sending first fragment
Sending duplicate second fragment with real data
Sending second fragment with fake data
Sending third and final fragment
ATTACK Firewall 4 – resending fragments with different data within stream (2nd real)
Sending first fragment
Sending second fragment with fake data
Sending duplicate second fragment with real data
Sending third and final fragment
ATTACK Firewall 5 – resending fragments with different data after completion
Sending first fragment
Sending second fragment
Sending third and final fragment
Sending duplicate second fragment with fake data
ATTACK Firewall 6 – overlapping third fragment into second with valid data
Sending first fragment
Sending second fragment
Sending third and final fragment overlapping into second
ATTACK Firewall 7 – overlapping third fragment into second
Sending first fragment
Sending second fragment
Sending third and final fragment overlapping into second
ATTACK Firewall 8 – overlapping second fragment into third
Sending first fragment
Sending third and final fragment – but not the last
Sending second fragment overlapping into third
ATTACK Implementation 9 – one shot fragment
Sending one-shot fragment ping
ATTACK Implementation 10 – double one shot fragments
Sending double one-shot fragments ping
ATTACK Implementation 11 – 137 one shot fragments
Sending 137 one-shot fragments ping
ATTACK Implementation 12 – 175 one shot fragments
Sending 180 one-shot fragments ping
ATTACK Implementation 13 – sending 65486 bytes in 54 fragments
Sending 54 fragments ping
ATTACK Implementation 14 – sending 65495 bytes in 54 fragments
Sending 54 fragments ping
Warning: checksums for packets > 65535 are unreliable due implementation differences on target platforms
ATTACK Implementation 15 – sending 65535 bytes in 54 fragments
Sending 54 fragments ping
Warning: checksums for packets > 65535 are unreliable due implementation differences on target platforms
ATTACK Implementation 16 – sending 66920 bytes in 47 fragments
Sending 47 fragments ping
Warning: checksums for packets > 65535 are unreliable due implementation differences on target platforms
ATTACK Implementation 17 – replacing fragments with new, different data
Sending first fragment
Sending second fragment with fake data
Sending duplicate second fragment with real data and ttl=64
Sending third and final fragment
ATTACK Implementation 18 – replacing fragments with new, different data
Sending first fragment
Sending duplicate second fragment with real data and ttl=64
Sending second fragment with fake data
Sending third and final fragment
ATTACK DOS 19 – sending only first fragment
Sending first fragment
ATTACK DOS 20 – sending only second fragment
Sending second fragment
ATTACK DOS 21 – sending only last fragment
Sending third and final fragment
ATTACK DOS 22 – sending first, middle and final frag with 1k holes in between
Sending first fragment
Sending second fragment
Sending third and final fragment
ATTACK DOS 23 – sending first, middle and final frag with 4k holes in between
Sending first fragment
Sending second fragment
Sending third and final fragment
ATTACK DOS 24 – sending first, middle and final frag with 16k holes in between
Sending first fragment
Sending second fragment
Sending third and final fragment
ATTACK DOS 25 – one shot fragment without content
Sending one-shot fragment with 0 byte TCP data
ATTACK DOS 26 – one shot fragment with 1 byte content
Sending one-shot fragment with 1 byte TCP data
ATTACK DOS 27 – last fragment has offset 0 and no data
Sending first fragment
Sending second fragment
Sending third and final fragment with offset 0
ATTACK DOS 28 – last fragment has offset 0
Sending first fragment
Sending second fragment
Sending third and final fragment with offset 0
ATTACK DOS 29 – last fragment has offset 1
Sending first fragment
Sending second fragment
Sending third and final fragment with offset 1
ATTACK DOS 30 – last fragment at 8191 + 7 bytes
Sending first fragment
Sending fragments 2-46
Sending fragment 47 (preparation fragment)
Sending final fragment with 8191 and sending 7 bytes
ATTACK DOS 31 – last fragment at 8191 + 8 bytes
Sending first fragment
Sending fragments 2-46
Sending fragment 47 (preparation fragment)
Sending final fragment with 8191 and sending 8 bytes
ATTACK DOS 32 – last fragment at 8191 + 9 bytes
Sending first fragment
Sending fragments 2-46
Sending fragment 47 (preparation fragment)
Sending final fragment with 8191 and sending 9 bytes
ATTACK DOS 33 – last fragment at 8191 + 1414 bytes
Sending first fragment
Sending fragments 2-46
Sending fragment 47 (preparation fragment)
Sending final fragment with 8191 and sending 1414 bytes

Usage

Syntax

fragmentation6 [-fp] [-n number] interface destination [test-case-no]

Options

-f activates flooding mode, no pauses between sends Fragmentation6 
-p disables first and final pings Fragmentation6  
-n number specifies how often each test is performed Fragmentation6 

Example

Fragmentation6

[email protected]cyborg:~$ fragmentation6 eth0 fe80::200:5aee:feaa:20a2

0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?