官术网_书友最值得收藏!

Malformed packets

Maliciously malformed packets take advantage of vulnerabilities in operating systems and applications by intentionally altering the content of data fields in network protocols. These vulnerabilities may include causing a system crash (a form of denial of service) or forcing the system to execute the arbitrary code.

An example of malformed packet vulnerability is Cisco Security Advisory cisco-sa-20140611-ipv6, wherein vulnerability in parsing malformed IPv6 packets in a certain series of routers could cause a reload (reboot) of a certain card that carries network traffic, which could intermittently cause service outages.

Another example of this kind of vulnerability is in some unpatched Windows or Linux systems that will crash if they receive a series of fragmented packets where the fragments overlap each other.

The types and possibilities of malformed packets are endless, but vulnerabilities are usually announced as they are discovered and some may provide packet details. You can build display filters and/or build coloring rules in Wireshark to detect these packets. It also helps to study and understand what range of values the different protocol fields normally and legally contain, and what TCP and other protocol sequences normally look like so you can spot suspicious contents in packet flows.

主站蜘蛛池模板: 新昌县| 建阳市| 嘉峪关市| 平江县| 鲁甸县| 辽源市| 博客| 石渠县| 饶河县| 山东| 大姚县| 新野县| 阿克| 海丰县| 介休市| 新疆| 湟中县| 虹口区| 平南县| 化德县| 额尔古纳市| 宁夏| 朝阳县| 义乌市| 浠水县| 富源县| 三原县| 鄱阳县| 上思县| 德阳市| 玉林市| 筠连县| 湟源县| 栾城县| 阜平县| 宜良县| 时尚| 新巴尔虎右旗| 商河县| 平江县| 余姚市|