Question: Task 2 . 3 ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding

Task 2.3 ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding that destination. One of the most common forms of ICMP messages are Ping messages (Echo request/Echo reply). These messages are used to ensure a certain destination is reachable. One common example of this is to test if our computer(s) are getting internet connection by pinging google.com or another known host in our network. However, like TCP SYN Flood attack, ICMP can be exploited to conduct an ICMP Flood attack which is also a DoS attack used to hog the resources of a target machine. An example of running the ICMP Flood Attack is given as follows. Note that you are using the Metasploitable 2 Linux as the target so replace the IP address 192.168.124.129 with the IP address of your Metasploitable 2 Linux.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!