An exploit sending a ping to a broadcast address using a spoofed source address. Consequently, everyone on the target segment responds to the source address, flooding the targeted site with traffic.
With this kind of attack, someone sends an IP ping (or “echo my message back to me”) request to some recipient Website. Actually, the ping packet states that it should be broadcast to more than one host within the recipient Website’s local network. The ping packet also indicates that the request is from another Website, the target site that is to receive the Denial of Service (DoS). The result is that many Ping replies will be flooding back to the spoofed host, and if the flood is severe enough, the spoofed host will no longer be able to distinguish real traffic or receive it.
Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html; TechTarget. Denial of Service. [Online, May 16, 2001.] TechTarget Website. http://searchsecurity.techtarget .com/sDefinition/0,,sid14_gci213591,00.html.