Updated version of the white-paper discussing the Rose Attack method and how sending two parts of a fragmented packet can cause various outcomes to network devices, including denial of service problems.
aa2f2ff730fea23f570e3ae205be9c0e9da54e6c7f83c0637e38973166c67f1a
Program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.
1affe79e6026e065c1e1f74743818f1905a9bd31d0c94f82f8de9b88e54adc91