Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Task 2 . 3 ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding

Task 2.3 ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding that destination. One of the most common forms of ICMP messages are Ping messages (Echo request/Echo reply). These messages are used to ensure a certain destination is reachable. One common example of this is to test if our computer(s) are getting internet connection by pinging google.com or another known host in our network. However, like TCP SYN Flood attack, ICMP can be exploited to conduct an ICMP Flood attack which is also a DoS attack used to hog the resources of a target machine. An example of running the ICMP Flood Attack is given as follows. Note that you are using the Metasploitable 2 Linux as the target so replace the IP address 192.168.124.129 with the IP address of your Metasploitable 2 Linux.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Basics Computer EngineeringInformation Warehouse Basics From Science

Authors: Odiljon Jakbarov ,Anvarkhan Majidov

1st Edition

620675183X, 978-6206751830

More Books

Students also viewed these Databases questions

Question

4. What are the advantages of a qualitative study?

Answered: 1 week ago