CAPEC-285: ICMP Echo Request Ping

Detailed Stable 严重程度: Low 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary sends out an ICMP Type 8 Echo Request, commonly known as a 'Ping', in order to determine if a target system is responsive. If the request is not blocked by a firewall or ACL, the target host will respond with an ICMP Type 0 Echo Reply datagram. This type of exchange is usually referred to as a 'Ping' due to the Ping utility present in almost all operating systems. Ping, as commonly implemented, allows a user to test for alive hosts, measure round-trip time, and measure the percentage of packet loss.

前提条件

  • The ability to send an ICMP type 8 query (Echo Request) to a remote target and receive an ICMP type 0 message (ICMP Echo Reply) in response. Any firewalls or access control lists between the sender and receiver must allow ICMP Type 8 and ICMP Type 0 messages in order for a ping operation to succeed.

所需技能

Low The adversary needs to know certain linux commands for this type of attack.

所需资源

  • Scanners or utilities that provide the ability to send custom ICMP queries.

后果影响

影响范围: Confidentiality

技术影响: Other

说明: A successful attack of this kind can identify open ports and available services on a system.

缓解措施

Consider configuring firewall rules to block ICMP Echo requests and prevent replies. If not practical, monitor and consider action when a system has fast and a repeated pattern of requests that move incrementally through port numbers.

关键信息

CAPEC ID: CAPEC-285

抽象级别: Detailed

状态: Stable

典型严重程度: Low

攻击可能性: Medium

相关攻击模式
相关CWE弱点