What Is the Ping of Death (PoD)? Definition, Damage & Defense

During a ping of death attack, one computer sends a large ping data packet. The huge data load crashes the recipient's computer. In some cases, that crash allows hackers to take over the computer to enact malicious code.

A "ping" is a command within the Internet Protocol network. Computers use it to determine if a host is online and available. 

We once thought of a ping of death as a legacy technique. As long as we were using updated software, we told ourselves, we'd be safe. But hackers have tweaked and resurrected the method, and new versions emerged in late 2020. 

What is a ping of death attack?

Is another computer online? Can you communicate with it? A ping, sent via the Internet Control Message Protocol (ICMP), helps you answer that question.

You send a ping, the source machine responds, and you're connected. A ping of death hijacks this process. 

Ping packet sizes were capped at 65,535 bytes per the Internet Protocol released in the 1980s. As designers created their consumer-facing systems, they never imagined getting larger packets. But that’s exactly what a ping of death attack uses. 

During a ping of death, an attacker:

  • Chooses a victim. All the hacker needs is an IP address. Attackers don’t need detailed knowledge of the age of the machine or its operating system. 
  • Fragments. Attackers break large payloads into pieces, so they can send them sequentially. 
  • Releases. All of those bits head to the victim in a series of pings. When the system attempts to reassemble the information, the pings exceed the byte cap. The system crashes. 

The original ping of death attacks happened in the 1990s and early 2000s. Developers reworked code to eliminate risks, and most consumers thought the threat had passed. 

Unfortunately, the hack came back in 2013. Consumers were urged to download patches, so their Internet Explorer systems wouldn't be vulnerable and crash. On one day, Microsoft released 19 patches to fix the issue. 

In October of 2020, the ping of death returned. Microsoft once again responded with patches to help consumers eliminate the risk and strengthen their security. Reporters also helped spread the word. They warned consumers that hackers could use this version of the ping to take over computers and execute malicious code

It's important to note that a ping of death doesn't typically target something big, like a server. Instead, this method takes down individu