ICMP_Scanning_37
ICMP Usage in Scanning
37
Copyright Ó Ofir Arkin, 2000
http://www.sys-security.com
8.0 Conclusion
The ICMP protocol is a very powerful tool in the hands of smart malicious computer attackers.
Mapping and detecting of hosts and networking devices can be done in various ways as I have
outlined in this paper.
It is extremely important to understand that ICMP traffic can be used to other malicious activities
other than scanning, such as:
·
Denial of Service Attacks
·
Distributed Denial of Service Attacks
·
Covert Channel Communications
Therefore filtering Inbound and Outbound ICMP traffic is very important and may help you in
preventing risks to your computing environment.