CAPEC 494 TCP Fragmentation

Draft Standard Unknown Risk

Description

An adversary may execute a TCP Fragmentation attack against a target with the intention of avoiding filtering rules of network controls, by attempting to fragment the TCP packet such that the headers flag field is pushed into the second fragment which typically is not filtered.

Mitigations

1

Consequences

Relationships