Solved

Icmp flooding

Posted on 2002-04-11
8
1,876 Views
Last Modified: 2012-05-04
What is icmp flooding ?

Thanks and Regards.
0
Comment
Question by:leumas
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933493
# for exmample:
ping -s 1000000 -t 255 -f -i 0.01 -l 1000000
0
 

Accepted Solution

by:
Shoeb_786 earned 10 total points
ID: 6933580
If ur network is flooded with icmp message dg: ping message . it is called icmp flooding. Generally when u ping to a broadcast address, this happens and your entire network just crumples down

Regards
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933623
> .. and your entire network just crumples down
which network? Not mine :-))
0
IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

 
LVL 24

Expert Comment

by:SunBow
ID: 6948818
IMO, Shoeb_786 is incorrect, in part merely rephrasing question.
ditto ahoffmann * 2
although more elaborate comments could be made
this not a good time (esp for 10p)
0
 
LVL 4

Expert Comment

by:boxcar7
ID: 6970799
ICMP flooding is basically just sending an echo request ICMP packet (like from a ping) to a broadcast address.  Normally, NIC cards will only respond to their own IP address.  However, they will also respond to the broadcast address for their subnet (which is generally the last address on the subnet).  By sending the echo request to the broadcast address, *theoretically* every machine on the subnet will reply to the request with the ICMP echo reply packet.  This kind of flooding becomes even more insidious when the requester uses a forged source IP address, because assuming the victim doesn't flood his router with the reply, the replies will all be directed at the forged source IP address, another hapless victim.

In practice, most routers or firewalls are set to not allow directed broadcasts. That will prevent this type of attack (at least from the outside).
0
 
LVL 3

Expert Comment

by:FlamingSword
ID: 7048029
ping
0
 

Author Comment

by:leumas
ID: 7048667
thx
0
 

Author Comment

by:leumas
ID: 7048668
thx
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month7 days, 22 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question