0% found this document useful (0 votes)
186 views1 page

ICMP CheatSheet Part2 - (Networkwalks - Com) v1

ICMP (Internet Control Message Protocol) is used for ping and traceroute functions but poses some security threats. ICMP messages can originate from any system and be used for reconnaissance, scanning attacks, and denial of service attacks by flooding a target with ICMP messages. While ICMP provides useful network functions, it is inherently insecure and difficult to secure. Disabling ICMP requests from outside networks and only enabling it where necessary can help mitigate security risks.

Uploaded by

Khalid Bakri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
186 views1 page

ICMP CheatSheet Part2 - (Networkwalks - Com) v1

ICMP (Internet Control Message Protocol) is used for ping and traceroute functions but poses some security threats. ICMP messages can originate from any system and be used for reconnaissance, scanning attacks, and denial of service attacks by flooding a target with ICMP messages. While ICMP provides useful network functions, it is inherently insecure and difficult to secure. Disabling ICMP requests from outside networks and only enabling it where necessary can help mitigate security risks.

Uploaded by

Khalid Bakri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ICMP (Internet Control Message Protocol) – Cheat Sheet Part w

How ICMP Ping works?

Play video

www.networkwalks.com

How ICMP Traceroute works?

Play video

www.networkwalks.com

ICMP Security Threats ICMP Security Mitigations www.networkwalks.com

ICMP is insecure and hard to secure because ICMP messages can originate from any Always disable the ICMP requests to your network
system on the Internet. from OUTSIDE
Reconnaissance & Scanning Attacks: Attacker uses ICMP Always disable the ICMP Protocol on network
Sweeps & traceroute for thorough scan of the network
devices where not necessary
DoS Attacks: Attacker floods the target network/system with
ICMP messages resulting in degraded or no availability
Other Attacks (Smurf Attacks, Ping of Death Attacks
ICMP based Attacks to other protocols like TCP, HTTP,…)

*Please refer to the attached video animation for better understanding


on how Ping & Traceroute work New batch of online Cisco CCNA 200-301 is starting!
Enrol today with us for quality training: [email protected]

/Network Walks /NetworkWalks /company/networkwalks


Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams

Network Walks Training Academy www.networkwalks.com


Your Feedback, Comments are always Welcomed: [email protected]

You might also like