Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1883
  • Last Modified:

Icmp flooding

What is icmp flooding ?

Thanks and Regards.
0
leumas
Asked:
leumas
1 Solution
 
ahoffmannCommented:
# for exmample:
ping -s 1000000 -t 255 -f -i 0.01 -l 1000000
0
 
Shoeb_786Commented:
If ur network is flooded with icmp message dg: ping message . it is called icmp flooding. Generally when u ping to a broadcast address, this happens and your entire network just crumples down

Regards
0
 
ahoffmannCommented:
> .. and your entire network just crumples down
which network? Not mine :-))
0
New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

 
SunBowCommented:
IMO, Shoeb_786 is incorrect, in part merely rephrasing question.
ditto ahoffmann * 2
although more elaborate comments could be made
this not a good time (esp for 10p)
0
 
boxcar7Commented:
ICMP flooding is basically just sending an echo request ICMP packet (like from a ping) to a broadcast address.  Normally, NIC cards will only respond to their own IP address.  However, they will also respond to the broadcast address for their subnet (which is generally the last address on the subnet).  By sending the echo request to the broadcast address, *theoretically* every machine on the subnet will reply to the request with the ICMP echo reply packet.  This kind of flooding becomes even more insidious when the requester uses a forged source IP address, because assuming the victim doesn't flood his router with the reply, the replies will all be directed at the forged source IP address, another hapless victim.

In practice, most routers or firewalls are set to not allow directed broadcasts. That will prevent this type of attack (at least from the outside).
0
 
FlamingSwordCommented:
ping
0
 
leumasAuthor Commented:
thx
0
 
leumasAuthor Commented:
thx
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now