当前位置:网站首页>What is the function of ICMP Protocol and the principle of Ping of death attack?
What is the function of ICMP Protocol and the principle of Ping of death attack?
2022-06-28 10:38:00 【IDC02_ FEIYA】
Ping of Death What is the principle of attack ?
ICMP The role of the agreement
ICMP yes “Internet Control Message Protocol”(Internet Control message protocol ) Abbreviation . It is TCP/IP A sub protocol of the protocol family , Used in IP host 、 Routing control messages between routers . Control message means that the network is not accessible 、 Whether the host can reach 、 Whether the route is available and so on . Although these control messages do not transmit user data , But it plays an important role in the transmission of user data .
In the network, we often use ICMP agreement , It's just imperceptible . For example, it is often used to check whether the network is connected Ping command , This “ping” The process is actually ICMP The process of agreement work . There are other network commands , Such as tracking route Tracert Commands are also based on ICMP Agreed .
ICMP Protocol is very important for network security .ICMP The characteristics of the protocol itself determine that it is very easy to be used to attack routers and hosts on the network . for example , stay 1999 year 8 In June, a company “ Offer a reward ”50 In the process of 10000 yuan testing firewall , Its firewall suffers ICMP Attack Da 334050 times , Of the total number of attacks 90% above . so ICMP The importance of can never be ignored .
such as , You can use the... Specified by the operating system ICMP The maximum packet size does not exceed 64KB This rule , Initiate... To the host “Ping of Death”( Death Ping) attack .
Ping of Death Attack principle
“Ping of Death” The principle of attack is : If ICMP The packet size exceeds 64KB At the upper limit , The host will have a memory allocation error , Lead to TCP/IP Stack crash , Cause the host to crash .
Besides , To the target host for a long time 、 continuity 、 Send a lot of ICMP Data packets , It will eventually paralyze the system . a large number of ICMP Packets will form “ICMP The storm ”, It makes the target host consume a lot of CPU Resource processing , Tired of crash .
ping.exe The principle is , To specify the IP Address sends a packet of a certain length , As agreed , If specified IP If the address exists , Will return the same size packet , Of course , If you don't return within a specific time , Namely “ Overtime ”, It is considered that the designated IP The address doesn't exist . because ping It uses ICMP agreement , Some firewall software will block ICMP So sometimes ping The results can only be used as a reference ,ping It doesn't necessarily mean that the other party IP non-existent .
ping Command is a very useful network command , We often use it to test network connectivity . But it's also a double-edged sword , Others use ping Commands can detect a lot of sensitive information on your computer , Cause insecurity . For the sake of safety , prevent ping There are many ways , Like firewalls , Another example is to create a system that prohibits all computers ping This machine IP Address security policy .
because ping It uses ICMP agreement , Some firewall software will block ICMP agreement .IPSec How the security policy “ prevent ping” Of ? The principle is to create a new IPSec The policy filters all the data in this machine ICMP Data packets . This can really effectively “ prevent ping”, But it will also leave sequelae . because ping Command and ICMP The agreement is closely related .
stay ICMP The protocol application contains 11 A message format , among ping Command is to use ICMP In the agreement “Echo Request” Message to work . but IPSec Security policy prevention ping Use the kill to kill method , Put all the ICMP All messages are filtered , In particular, all messages in other formats are also filtered at the same time . Therefore, in the LAN environment of some special applications , Prone to packet loss , Affect the normal work of users . Therefore, it is recommended to use firewall .
边栏推荐
猜你喜欢
港伦敦金行情走势图所隐藏的信息
使用 ABAP 操作 Excel 的几种方法
Several methods of using ABAP to operate Excel
手把手教你处理 JS 逆向之 SVG 映射
Katalon全局变量在TestObject引用
Information hidden in the trend chart of Hong Kong London gold market
Ruoyi integrated building block report (NICE)
[unity] built in rendering pipeline to URP
How to use output in katalon
etf持仓如何影响现货金价?
随机推荐
丢弃 Tkinter!简单配置快速生成超酷炫 GUI!
【实操】Appium Settings app is not running after 5000ms
Please consult me. I run the MYSQL to MySQL full synchronization of flykcdc in my local ide. This is in my local ide
[unity][ecs] learning notes (III)
Several methods of using ABAP to operate Excel
Fastposter v2.8.4 release e-commerce poster generator
MySQL查看数据库性能常用命令
手把手教你处理 JS 逆向之 SVG 映射
物联网5种无线传输协议特点大汇总
Redis database
Chapter 3 stack and queue
Information hidden in the trend chart of Hong Kong London gold market
etf持仓如何影响现货金价?
Google开源依赖注入框架-Guice指南
2022 Wu Enda machine learning specialization week 2 practice lab: linear expression
Idea failed to connect to SQL Sever
Missed the golden three silver four, found a job for 4 months, interviewed 15 companies, and finally got 3 offers, ranking P7+
DlhSoft Kanban Library for WPF
Guangzhou Customs supports the stable supply of food, agricultural products, traditional Chinese medicine and other civilian and biological resources to Hong Kong
Realization of a springboard machine