User's Manual

363
TearDrop
TearDrop uses the information, which is contained in the packet header in the trusted IP fragment in the TCP/IP
stack, to realize the attack. IP fragment contains the information that indicates which part of the original packet
is contained, and some TCP/IP stacks will break down when they receive the fake fragment that contains the
overlapping offset.