Teardrop attack

December 2016

Fragment attack

A "fragment attack" is a network saturation (denial-of-service) attack that exploits the fragmentation principle of the IP protocol.

The IP protocol is used to fragment large packets into several IP packets each having a sequence number and a common identification number. When receiving data, the recipient reassembles the packets thanks to the offset values they contain.

The most famous fragment attack is the Teardrop attack. The principle of the Teardrop attack involves inserting false offset information into fragmented packets. As a result, during reassembly, there are empty or overlapping fragments that can cause the system to be unstable.

Recent systems are no longer vulnerable to this attack.

More information


Related :


Ataque Teardrop
Ataque Teardrop
Teardrop Angriff
Teardrop Angriff
Attaque Teardrop
Attaque Teardrop
Attocco IP fragmentation
Attocco IP fragmentation
Ataque Teardrop
Ataque Teardrop
This document entitled « Teardrop attack » from CCM (ccm.net) is made available under the Creative Commons license. You can copy, modify copies of this page, under the conditions stipulated by the license, as this note appears clearly.