By the end of this section, you will be able to:
● Understand the concept and mechanism of the Ping of Death (PoD) attack.
● Execute a PoD attack in a controlled lab environment.
● Observe and analyze the impact of the attack on the target machine (PC1).
In this exercise, you will explore:
● The historical background and technical details of the Ping of Death vulnerability.
● Tools and methods to craft and send malformed ping packets.
● How to target PC1 and monitor its response (e.g., system freeze, crash, or unresponsiveness).