ICMP (Internet Control Message Protocol) – Cheat Sheet Part w
How ICMP Ping works?
Play video
www.networkwalks.com
How ICMP Traceroute works?
Play video
www.networkwalks.com
ICMP Security Threats ICMP Security Mitigations www.networkwalks.com
ICMP is insecure and hard to secure because ICMP messages can originate from any Always disable the ICMP requests to your network
system on the Internet. from OUTSIDE
Reconnaissance & Scanning Attacks: Attacker uses ICMP Always disable the ICMP Protocol on network
Sweeps & traceroute for thorough scan of the network
devices where not necessary
DoS Attacks: Attacker floods the target network/system with
ICMP messages resulting in degraded or no availability
Other Attacks (Smurf Attacks, Ping of Death Attacks
ICMP based Attacks to other protocols like TCP, HTTP,…)
*Please refer to the attached video animation for better understanding
on how Ping & Traceroute work New batch of online Cisco CCNA 200-301 is starting!
Enrol today with us for quality training:
[email protected] /Network Walks /NetworkWalks /company/networkwalks
Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams
Network Walks Training Academy www.networkwalks.com
Your Feedback, Comments are always Welcomed:
[email protected]