What kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?
- ICMP echo request
- ICMP unreachable
- ICMP redirects
- ICMP mask reply
Explanation:Common ICMP messages of interest to threat actors include the following:
ICMP echo request and echo reply: used to perform host verification and DoS attacks
ICMP unreachable: used to perform network reconnaissance and scanning attacks
ICMP mask reply: used to map an internal IP network
ICMP redirects: used to lure a target host into sending all traffic through a compromised device and create a man-in-the-middle attack
ICMP router discovery: used to inject bogus route entries into the routing table of a target host
Exam with this question: Modules 13 - 17: Threats and Attacks Group Exam
Exam with this question: Network Security Checkpoint Exam Answers
Please login or Register to submit your answer