Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Task 2 . 3 ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding
Task ICMP Flooding Attack ICMP is a protocol that is used to check a destination for errors and return other information regarding that destination. One of the most common forms of ICMP messages are Ping messages Echo requestEcho reply These messages are used to ensure a certain destination is reachable. One common example of this is to test if our computers are getting internet connection by pinging google.com or another known host in our network. However, like TCP SYN Flood attack, ICMP can be exploited to conduct an ICMP Flood attack which is also a DoS attack used to hog the resources of a target machine. An example of running the ICMP Flood Attack is given as follows. Note that you are using the Metasploitable Linux as the target so replace the IP address with the IP address of your Metasploitable Linux.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started