IP Fragment Reassembly with Scapy

Overlapping IP fragments can be used by attackers to hide nefarious intentions from intrusion detection system and analysts. Operating systems give preference to overlapping fragments based upon either the position in the packet or the time of arrival. As a result fragmented packets might be...
July 5, 2012

All papers are copyrighted. No re-posting of papers is permitted