当前位置:网站首页>What is the function of ICMP Protocol and the principle of Ping of death attack?
What is the function of ICMP Protocol and the principle of Ping of death attack?
2022-06-28 10:38:00 【IDC02_ FEIYA】
Ping of Death What is the principle of attack ?
ICMP The role of the agreement
ICMP yes “Internet Control Message Protocol”(Internet Control message protocol ) Abbreviation . It is TCP/IP A sub protocol of the protocol family , Used in IP host 、 Routing control messages between routers . Control message means that the network is not accessible 、 Whether the host can reach 、 Whether the route is available and so on . Although these control messages do not transmit user data , But it plays an important role in the transmission of user data .
In the network, we often use ICMP agreement , It's just imperceptible . For example, it is often used to check whether the network is connected Ping command , This “ping” The process is actually ICMP The process of agreement work . There are other network commands , Such as tracking route Tracert Commands are also based on ICMP Agreed .
ICMP Protocol is very important for network security .ICMP The characteristics of the protocol itself determine that it is very easy to be used to attack routers and hosts on the network . for example , stay 1999 year 8 In June, a company “ Offer a reward ”50 In the process of 10000 yuan testing firewall , Its firewall suffers ICMP Attack Da 334050 times , Of the total number of attacks 90% above . so ICMP The importance of can never be ignored .
such as , You can use the... Specified by the operating system ICMP The maximum packet size does not exceed 64KB This rule , Initiate... To the host “Ping of Death”( Death Ping) attack .
Ping of Death Attack principle
“Ping of Death” The principle of attack is : If ICMP The packet size exceeds 64KB At the upper limit , The host will have a memory allocation error , Lead to TCP/IP Stack crash , Cause the host to crash .
Besides , To the target host for a long time 、 continuity 、 Send a lot of ICMP Data packets , It will eventually paralyze the system . a large number of ICMP Packets will form “ICMP The storm ”, It makes the target host consume a lot of CPU Resource processing , Tired of crash .
ping.exe The principle is , To specify the IP Address sends a packet of a certain length , As agreed , If specified IP If the address exists , Will return the same size packet , Of course , If you don't return within a specific time , Namely “ Overtime ”, It is considered that the designated IP The address doesn't exist . because ping It uses ICMP agreement , Some firewall software will block ICMP So sometimes ping The results can only be used as a reference ,ping It doesn't necessarily mean that the other party IP non-existent .
ping Command is a very useful network command , We often use it to test network connectivity . But it's also a double-edged sword , Others use ping Commands can detect a lot of sensitive information on your computer , Cause insecurity . For the sake of safety , prevent ping There are many ways , Like firewalls , Another example is to create a system that prohibits all computers ping This machine IP Address security policy .
because ping It uses ICMP agreement , Some firewall software will block ICMP agreement .IPSec How the security policy “ prevent ping” Of ? The principle is to create a new IPSec The policy filters all the data in this machine ICMP Data packets . This can really effectively “ prevent ping”, But it will also leave sequelae . because ping Command and ICMP The agreement is closely related .
stay ICMP The protocol application contains 11 A message format , among ping Command is to use ICMP In the agreement “Echo Request” Message to work . but IPSec Security policy prevention ping Use the kill to kill method , Put all the ICMP All messages are filtered , In particular, all messages in other formats are also filtered at the same time . Therefore, in the LAN environment of some special applications , Prone to packet loss , Affect the normal work of users . Therefore, it is recommended to use firewall .
边栏推荐
- Set up your own website (11)
- Several methods of using ABAP to operate Excel
- Install using snap in opencloudos NET 6
- Markdown -- basic usage syntax
- Fastposter v2.8.4 release e-commerce poster generator
- Fabric. How to use js brush?
- 移动命令
- Realization of a springboard machine
- Realization of a springboard machine
- Discard Tkinter! Simple configuration to quickly generate cool GUI!
猜你喜欢

如何使用 DataAnt 监控 Apache APISIX

Realization of a springboard machine
![[Unity][ECS]学习笔记(二)](/img/72/d3e46a820796a48b458cd2d0a18f8f.png)
[Unity][ECS]学习笔记(二)

I'm almost addicted to it. I can't sleep! Let a bug fuck me twice!

接口自动化框架脚手架-利用反射机制实现接口统一发起端

Set up your own website (11)

一文读懂 12种卷积方法(含1x1卷积、转置卷积和深度可分离卷积等)

Training and recognition of handwritten digits through the lenet-5 network built by pytorch

sentinel

Sqlcmd database connection error
随机推荐
Set up your own website (11)
An idea plug-in that automatically generates unit tests, which improves the development efficiency by more than 70%!
Mongo数据库
JSON module, hashlib, Base64
物联网5种无线传输协议特点大汇总
Why does istio use spirit for identity authentication?
增强 Jupyter Notebook 的功能,这里有四个妙招
mysql数据库概述以及安装过程
接口自动化框架脚手架-利用反射机制实现接口统一发起端
Realize an air conditioner with compose to bring you cool in summer
Information hidden in the trend chart of Hong Kong London gold market
Interface automation framework scaffold - use reflection mechanism to realize the unified initiator of the interface
MarkDown——基本使用语法
Minimum stack < difficulty coefficient >
Katalon当中的debug调试
Markdown -- basic usage syntax
如何使用 DataAnt 监控 Apache APISIX
一文读懂 12种卷积方法(含1x1卷积、转置卷积和深度可分离卷积等)
Décompression par compression
fastposter v2.8.4 发布 电商海报生成器