We often use the CMD command “Ping” to mostly check if a server or a gateway is up and running. But, ping command can also be used for some other purposes.
If we look at the basic level, then a ping packet is generally of size 56 bytes or 84 bytes (including IP header as well). However, a ping packet can also be made as large as up to 65536 bytes.
Well, that’s the negative side of the ping packet. When we increase the size of the ping packet unnaturally, forming a malformed ping packet to attack a computer system, this type of attack is called “Ping of death” attack.
Not all computers can handle data larger than a fixed size. So, when a ping of death packet is sent from a source computer to a target machine, the ping packet gets fragmented into smaller groups of packets.
One fragment is of 8 octets size. When these packets reach the target computer, they arrive in fragments. So, the target computer reassembles the malformed packets which are received in chunks. But, the whole assembled packet causes buffer overflow at the target computer.
This buffer flow often causes the system crash making the system more vulnerable to attack.
Once the system becomes more vulnerable to attack, it allows more attacks like the injection of a trojan horse on the target machine.
Disclaimer: This is just for educational purposes. It’s nothing great but you can use it to learn.
Here are the steps:
ping <IP Address> -l 65500 -w 1 -n 1
In the above command, replace <IP Address> with an IP address.
Note: This command might not work on some systems.