-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Learn Wireshark
By :

ICMP supports IP to help ensure data delivery; however, it can also be used in malicious ways. For example, ICMP can be used to conduct reconnaissance as a precursor to an attack, or even to help evade firewall rules. In this section, we'll provide an example of how ICMP can be used to obtain information on the network or to redirect traffic. Then, we'll evaluate some of the firewall rules used to limit the effectiveness of an attack.
Let's start with a brief discussion on a few attacks using ICMP.
ICMP can determine a great deal of information about a network. As a result, it can be used as an effective scanning tool. In addition, if security devices aren't tuned to disallow certain types of ICMP packets, you may be the victim of an attack, such as a Distributed Denial of Service (DDoS) or redirect attack.
First, let's start with an overview of a ping sweep, a technique used...
Change the font size
Change margin width
Change background colour