ICMP Attacks Flashcards
1
Q
ICMP Flood
A
A flood of ICMP Echo Requests (pings) comes in from one host (DoS) or multiple hosts (DDos)
2
Q
ICMP Echo Request and Echo Reply
A
Used to perform host verification and DoS attacks.
3
Q
ICMP unreachable
A
Used to perform network reconnaissance and scanning attacks.
4
Q
ICMP Mask Reply
A
Used to map an internal IP network.
5
Q
ICMP redirects
A
This is used to lure a target into sending all traffic through a compromised device and create a MiTM attack.
6
Q
A