What kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?

IT Questions BankCategory: CCNA CyberOpsWhat kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?

What kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?

  • ICMP echo request
  • ICMP unreachable
  • ICMP redirects
  • ICMP mask reply

Explanation:Common ICMP messages of interest to threat actors include the following:
ICMP echo request and echo reply: used to perform host verification and DoS attacks
ICMP unreachable: used to perform network reconnaissance and scanning attacks
ICMP mask reply: used to map an internal IP network
ICMP redirects: used to lure a target host into sending all traffic through a compromised device and create a man-in-the-middle attack
ICMP router discovery: used to inject bogus route entries into the routing table of a target host

Exam with this question: Modules 13 - 17: Threats and Attacks Group Exam
Exam with this question: Network Security Checkpoint Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments