Improve company productivity with a Business Account.Sign Up

x
?
Solved

Icmp flooding

Posted on 2002-04-11
8
Medium Priority
?
1,888 Views
Last Modified: 2012-05-04
What is icmp flooding ?

Thanks and Regards.
0
Comment
Question by:leumas
8 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933493
# for exmample:
ping -s 1000000 -t 255 -f -i 0.01 -l 1000000
0
 

Accepted Solution

by:
Shoeb_786 earned 40 total points
ID: 6933580
If ur network is flooded with icmp message dg: ping message . it is called icmp flooding. Generally when u ping to a broadcast address, this happens and your entire network just crumples down

Regards
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933623
> .. and your entire network just crumples down
which network? Not mine :-))
0
Easily Design & Build Your Next Website

Squarespace’s all-in-one platform gives you everything you need to express yourself creatively online, whether it is with a domain, website, or online store. Get started with your free trial today, and when ready, take 10% off your first purchase with offer code 'EXPERTS'.

 
LVL 24

Expert Comment

by:SunBow
ID: 6948818
IMO, Shoeb_786 is incorrect, in part merely rephrasing question.
ditto ahoffmann * 2
although more elaborate comments could be made
this not a good time (esp for 10p)
0
 
LVL 4

Expert Comment

by:boxcar7
ID: 6970799
ICMP flooding is basically just sending an echo request ICMP packet (like from a ping) to a broadcast address.  Normally, NIC cards will only respond to their own IP address.  However, they will also respond to the broadcast address for their subnet (which is generally the last address on the subnet).  By sending the echo request to the broadcast address, *theoretically* every machine on the subnet will reply to the request with the ICMP echo reply packet.  This kind of flooding becomes even more insidious when the requester uses a forged source IP address, because assuming the victim doesn't flood his router with the reply, the replies will all be directed at the forged source IP address, another hapless victim.

In practice, most routers or firewalls are set to not allow directed broadcasts. That will prevent this type of attack (at least from the outside).
0
 
LVL 3

Expert Comment

by:FlamingSword
ID: 7048029
ping
0
 

Author Comment

by:leumas
ID: 7048667
thx
0
 

Author Comment

by:leumas
ID: 7048668
thx
0

Featured Post

Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The Super Bowl is just days away. Millions of advertising dollars will be spent in just a few hours to drive people to websites around the globe. Optimizing your site in anticipation of a big event like this (and the traffic surges that follow) will…
It has been a full year since one of the worst ransomware attacks we have seen, the Wannacry attack last year. The attacks have changed.  The way we are addressing them has also changed, but maybe not enough.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question