Articles Blog | G5 Cyber Security

Research – Rose_Frag_Attack_Explained.txt

Updated version of the white-paper discussing the Rose Attack method and how sending two parts of a fragmented packet can cause various outcomes to network devices, including denial of service problems.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/33193/Rose_Frag_Attack_Explained.txt

Source: https://packetstormsecurity.com/files/33193/Rose_Frag_Attack_Explained.txt.html

Exit mobile version