Solved

Icmp flooding

Posted on 2002-04-11
8
1,872 Views
Last Modified: 2012-05-04
What is icmp flooding ?

Thanks and Regards.
0
Comment
Question by:leumas
8 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933493
# for exmample:
ping -s 1000000 -t 255 -f -i 0.01 -l 1000000
0
 

Accepted Solution

by:
Shoeb_786 earned 10 total points
ID: 6933580
If ur network is flooded with icmp message dg: ping message . it is called icmp flooding. Generally when u ping to a broadcast address, this happens and your entire network just crumples down

Regards
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933623
> .. and your entire network just crumples down
which network? Not mine :-))
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 24

Expert Comment

by:SunBow
ID: 6948818
IMO, Shoeb_786 is incorrect, in part merely rephrasing question.
ditto ahoffmann * 2
although more elaborate comments could be made
this not a good time (esp for 10p)
0
 
LVL 4

Expert Comment

by:boxcar7
ID: 6970799
ICMP flooding is basically just sending an echo request ICMP packet (like from a ping) to a broadcast address.  Normally, NIC cards will only respond to their own IP address.  However, they will also respond to the broadcast address for their subnet (which is generally the last address on the subnet).  By sending the echo request to the broadcast address, *theoretically* every machine on the subnet will reply to the request with the ICMP echo reply packet.  This kind of flooding becomes even more insidious when the requester uses a forged source IP address, because assuming the victim doesn't flood his router with the reply, the replies will all be directed at the forged source IP address, another hapless victim.

In practice, most routers or firewalls are set to not allow directed broadcasts. That will prevent this type of attack (at least from the outside).
0
 
LVL 3

Expert Comment

by:FlamingSword
ID: 7048029
ping
0
 

Author Comment

by:leumas
ID: 7048667
thx
0
 

Author Comment

by:leumas
ID: 7048668
thx
0

Featured Post

Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question