Fragmented packets are later on reconstructed through the receiver node at the IP layer. They can be then forwarded to the application layer. Fragmentation attacks create destructive packets by changing data in constituent fragmented packets with new knowledge. Whilst you want specialized expertise to create almost all of the absolutely free too