As we have already seen that What ICMP is with our previous bug, if you still do not read at just click on ICMP . How is ICMP used in DDoS attacks? ICMP flood attack A ping flood or ICMP flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources until legitimate users cannot receive service. Ping of death attack A ping of death attack is when the attacker sends a ping larger than the maximum allowable size for a packet to a targeted machine, causing the machine to freeze or crash. The packet gets fragmented on the way to its target, but when the target reassembles the packet into its original maximum-exceeding size, the size of the packet causes a buffer overflow. The ping of death attack is largely historical at this point. However, older networking equipment could still be susceptible to it. Smurf attack In a Smurf attack, the attac...
The Netwyman will provides you truthful and day to day basis Technology and Networking related updates, It can help you to connect with this Technology world. Also can help you to build your powerful knowledge in the era of Networking and Technologies, Netwyman provides an analysis related to the Technology and Networking level to clears your doubts. We will help you with basic level of information so it can help you to going further.