You are on page 1of 1

ICMP (Internet Control Message Protocol) – Cheat Sheet Part w

How ICMP Ping works?

Play video

www.networkwalks.com

How ICMP Traceroute works?

Play video

www.networkwalks.com

ICMP Security Threats ICMP Security Mitigations www.networkwalks.com

ICMP is insecure and hard to secure because ICMP messages can originate from any Always disable the ICMP requests to your network
system on the Internet. from OUTSIDE
Reconnaissance & Scanning Attacks: Attacker uses ICMP Always disable the ICMP Protocol on network
Sweeps & traceroute for thorough scan of the network
devices where not necessary
DoS Attacks: Attacker floods the target network/system with
ICMP messages resulting in degraded or no availability
Other Attacks (Smurf Attacks, Ping of Death Attacks
ICMP based Attacks to other protocols like TCP, HTTP,…)

*Please refer to the attached video animation for better understanding


on how Ping & Traceroute work New batch of online Cisco CCNA 200-301 is starting!
Enrol today with us for quality training: info@networkwalks.com

/Network Walks /NetworkWalks /company/networkwalks


Visit our website & You Channel for more FREE resources like Cheatsheets,
Workbooks, Labs, Interview Questions, Quiz, VCE exams

Network Walks Training Academy www.networkwalks.com


Your Feedback, Comments are always Welcomed: info@networkwalks.com

You might also like