Skip to main content

Questions tagged [icmp]

Abreviation of Internet Control Message Protocol. The protocol allows for the return propagation of error messages related to IP packets. ICMP is critical to basic network tools like ping and traceroute.

0 votes
0 answers
82 views

For years, I've used the following to accept 'RELATED' packets: ... /usr/sbin/iptables -P INPUT DROP ... /usr/sbin/iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT ... Use the ...
Joshua L's user avatar
0 votes
1 answer
144 views

I have two almost identical embedded hosts that I am scanning with NMAP on the specific UDP port 47808. On host 192.168.2.12 NMAP returns after a while with: while on 192.168.2.24 NMAP immediately ...
user2965433's user avatar
0 votes
1 answer
166 views

I am learning about ICMP smurf attack and for this, I have forged a packet with the following details: source_mac_address = **??** destination_mac_address = router mac address char ...
Rajat Aggarwal's user avatar
1 vote
1 answer
884 views

We use an external scanner (Qualys) to scan our external assets. We have a firewall in front of the external assets, but it is configured to whitelist the scanner so that the external assets get ...
Halooooo's user avatar
0 votes
1 answer
219 views

I'm having some issues getting Honeyd to work properly on an external network interface on Ubuntu 20 LTS running on a Proxmox server. I'm fairly sure it's a configuration/setup problem on the VM I'm ...
DavidM's user avatar
  • 1
3 votes
1 answer
2k views

Rootless podman, by proxy of the Linux Kernel, has restrictions against ping, It is most likely necessary to enable unprivileged pings on the host. Why do unprivileged pings need to be enabled? And ...
Evan Carroll's user avatar
  • 3,237
1 vote
0 answers
155 views

I'm learning about data exfiltration using ICMP and delivery of a payload is generally done using the -p "pad bytes" in ping -c 1 -p $encoded_payload. Are there often legitimate use for &...
ChocolateOverflow's user avatar
1 vote
1 answer
299 views

I recently came across a topic of network steganography, mostly connected with modifying the headers of IP, TCP, ICMP. I was looking for some real-world examples of malware that uses it. I only found ...
roffensive's user avatar
3 votes
1 answer
777 views

CVE-2020-16898 is a remote code execution vulnerability caused by the improper handling of ICMPv6 Router Advertisement packets by Windows TCP/IP stack. Microsoft's recommended workaround is to disable ...
Travis Madson's user avatar
1 vote
0 answers
148 views

if a customer wants to monitor an IPSec-based site-to-site VPN and basically no incoming traffic is needed, would you recommend: a) setting up a permanent tunnel that can be monitored all the time and ...
gumlozol's user avatar
0 votes
0 answers
74 views

I've researched this and found the following on StackExchange and ServerFault, but they're very old. https://serverfault.com/questions/55889/why-block-outbound-icmp Is it a bad idea for a firewall ...
SKidd's user avatar
  • 1
2 votes
3 answers
7k views

The capture file if needed There is supposed to be abnormal behaviour here, and I see that there is. But I can't figure out what it is. There is no response from the ICMP requests. Furthermore some ...
symto's user avatar
  • 21
2 votes
2 answers
305 views

I was recently looking at a network in which the client-machines could access a webservice endpoint but could not ping it. And there are other machines that can ping the webservice endpoint, but which ...
leeand00's user avatar
  • 1,601
1 vote
1 answer
1k views

I've recently started working as a security auditor and my mentor gave me some homework to write an Ubuntu security audit script so that I'll get to learn to use batch scripting and understand ...
user avatar
2 votes
3 answers
3k views

How can we measure the efficiency of the flood technique? Will it be by the number of bots required for flooding the link? In case of UDP and ICMP, which one would be more efficient and why?
hatellla's user avatar
  • 121

15 30 50 per page