What kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?

Questions BankCategory: CCNA CyberOpsWhat kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?
CCNA Questions Answers Staff asked 2 months ago
What kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?

  • ICMP echo request
  • ICMP unreachable
  • ICMP redirects
  • ICMP mask reply

Explanation:Common ICMP messages of interest to threat actors include the following:
ICMP echo request and echo reply: used to perform host verification and DoS attacks
ICMP unreachable: used to perform network reconnaissance and scanning attacks
ICMP mask reply: used to map an internal IP network
ICMP redirects: used to lure a target host into sending all traffic through a compromised device and create a man-in-the-middle attack
ICMP router discovery: used to inject bogus route entries into the routing table of a target host

More Questions: Modules 13 – 17: Threats and Attacks Group Exam


Related Articles