s the name suggests, the Teardrop Attack works gradually by sending the fragmented packets to a target machine. Itâ€™s a type of aÂ denial-of-service (DoS) attack which overwhelms the target machine with the incompleteÂ data so that the victim crashes down.
In Teardrop Attack, fragmented packets that are sent in the to the target machine, are buggy in nature and the victimâ€™s machine is unable to reassemble those packets due to the bug in the TCP/IP fragmentation.
In this way, the packets keep on getting accumulated over the victimâ€™s machine and finally due to the buffer overflow, the target machine crashes down.
How Teardrop Attack works?
Here, I am taking a reference from the Juniperâ€™s technical publication to illustrate how does it work â€”
As you can see in the above figure of IP header, which operates at the network layer, there is a field called fragment offset field.
Teardrop Attack and Fragment Offset:
Understand it like this â€” When a large amount of data is sent across the internet, the data is broken into the smaller fragments. Each of these fragmentsÂ is assigned a number. When they reach the receiving end, these fragments are rearranged to reproduce the original data or message.
To identify the sequencing of the fragments, the fragment offset field holds the necessary information using which the target machine rearranges the sequence.
However, in the Teardrop Attack, the fragment offset field is made buggy by the hacker so the victimâ€™s machine is unable to find the relative fragments.
So, as the name suggests, the buggy packets keep on accumulating at the victimâ€™s side like teardrops and ultimately it leads to theÂ machine crash.
However, modern networking devices can detect this discrepancy in a fragmented packet. Once they detect the problem, they simply drop the packet.