Fragmented packets are later reconstructed from the receiver node within the IP layer. They can be then forwarded to the applying layer. Fragmentation attacks create destructive packets by changing details in constituent fragmented packets with new data. This is an extremely handy practice, since rather then showing true breaches into https://fifa2014wiki.com/