Solved

Icmp flooding

Posted on 2002-04-11
8
1,847 Views
Last Modified: 2012-05-04
What is icmp flooding ?

Thanks and Regards.
0
Comment
Question by:leumas
8 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933493
# for exmample:
ping -s 1000000 -t 255 -f -i 0.01 -l 1000000
0
 

Accepted Solution

by:
Shoeb_786 earned 10 total points
ID: 6933580
If ur network is flooded with icmp message dg: ping message . it is called icmp flooding. Generally when u ping to a broadcast address, this happens and your entire network just crumples down

Regards
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6933623
> .. and your entire network just crumples down
which network? Not mine :-))
0
 
LVL 24

Expert Comment

by:SunBow
ID: 6948818
IMO, Shoeb_786 is incorrect, in part merely rephrasing question.
ditto ahoffmann * 2
although more elaborate comments could be made
this not a good time (esp for 10p)
0
Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

 
LVL 4

Expert Comment

by:boxcar7
ID: 6970799
ICMP flooding is basically just sending an echo request ICMP packet (like from a ping) to a broadcast address.  Normally, NIC cards will only respond to their own IP address.  However, they will also respond to the broadcast address for their subnet (which is generally the last address on the subnet).  By sending the echo request to the broadcast address, *theoretically* every machine on the subnet will reply to the request with the ICMP echo reply packet.  This kind of flooding becomes even more insidious when the requester uses a forged source IP address, because assuming the victim doesn't flood his router with the reply, the replies will all be directed at the forged source IP address, another hapless victim.

In practice, most routers or firewalls are set to not allow directed broadcasts. That will prevent this type of attack (at least from the outside).
0
 
LVL 3

Expert Comment

by:FlamingSword
ID: 7048029
ping
0
 

Author Comment

by:leumas
ID: 7048667
thx
0
 

Author Comment

by:leumas
ID: 7048668
thx
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now