Step 1: Fragmentation: The attacker crafts a large IP packet and fragments it into multiple smaller packets. Each fragment contains a portion of the original data and includes information about its position (offset) within the original packet.
Step 2: Malformed Offsets: The attacker intentionally manipulates the offset fields in the fragmented packets. This can involve overlapping fragments, incorrect ordering, or other inconsistencies.
Step 3: Packet Delivery: The attacker sends the malformed fragmented packets to the target system.
Step 4: Reassembly Failure: The target system attempts to reassemble the fragmented packets. Due to the malformed offsets, the reassembly process fails, leading to memory corruption, infinite loops, or resource exhaustion.
Step 5: Denial of Service: The target system becomes unresponsive or crashes, resulting in a denial of service.