Question: Task 2 . 3 ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding
Task ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding that destination. One of the most common forms of ICMP messages are Ping messages Echo requestEcho reply These messages are used to ensure a certain destination is reachable. One common example of this is to test if our computers are getting internet connection by pinging google.com or another known host in our network. However, like TCP SYN Flood attack, ICMP can be exploited to conduct an ICMP Flood attack which is also a DoS attack used to hog the resources of a target machine. An example of running the ICMP Flood Attack is given as follows. Note that you are using the Metasploitable Linux as the target so replace the IP address with the IP address of your Metasploitable Linux.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
