Dark Mode

Settings

Capec-285 Detail

ICMP Echo Request Ping

Detailed Software Likelihood: Medium Typical Severity: Low

Parents: 292

Threats: T60 T65 T80 T258 T273 T288 T291 T302 T334 T392 T407

Description

An adversary sends out an ICMP Type 8 Echo Request, commonly known as a 'Ping', in order to determine if a target system is responsive. If the request is not blocked by a firewall or ACL, the target host will respond with an ICMP Type 0 Echo Reply datagram. This type of exchange is usually referred to as a 'Ping' due to the Ping utility present in almost all operating systems. Ping, as commonly implemented, allows a user to test for alive hosts, measure round- trip time, and measure the percentage of packet loss.

Extended Description

Performing this operation for a range of hosts on the network is known as a 'Ping Sweep'. While the Ping utility is useful for small-scale host discovery, it was not designed for rapid or efficient host discovery over large network blocks. Other scanning utilities have been created that make ICMP ping sweeps easier to perform. Most networks filter ingress ICMP Type 8 messages for security reasons. Various other methods of performing ping sweeps have developed as a result. It is important to recognize the key security goal of the adversary is to discover if an IP address is alive, or has a responsive host. To this end, virtually any type of ICMP message, as defined by RFC 792 is useful. An adversary can cycle through various types of ICMP messages to determine if holes exist in the firewall configuration. When ICMP ping sweeps fail to discover hosts, other protocols can be used for the same purpose, such as TCP SYN or ACK segments, UDP datagrams sent to closed ports, etc.
External ID Source Link Description
CAPEC-285 capec https://capec.mitre.org/data/definitions/285.html
CWE-200 cwe http://cwe.mitre.org/data/definitions/200.html
REF-33 reference_from_CAPEC Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions (6th Edition), 2009, McGraw Hill
REF-123 reference_from_CAPEC http://www.faqs.org/rfcs/rfc792.html J. Postel, RFC792 - Internet Control Messaging Protocol, 1981--09, Defense Advanced Research Projects Agency (DARPA)
REF-124 reference_from_CAPEC http://www.faqs.org/rfcs/rfc1122.html R. Braden, Ed., RFC1122 - Requirements for Internet Hosts - Communication Layers, 1989--10
REF-125 reference_from_CAPEC http://nmap.org/docs/discovery.pdf Mark Wolfgang, Host Discovery with Nmap, 2002--11
REF-34 reference_from_CAPEC Gordon "Fyodor" Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (3rd "Zero Day" Edition,), 2008, Insecure.com LLC, ISBN: 978-0-9799587-1-7

Not present

  1. The ability to send an ICMP type 8 query (Echo Request) to a remote target and receive an ICMP type 0 message (ICMP Echo Reply) in response. Any firewalls or access control lists between the sender and receiver must allow ICMP Type 8 and ICMP Type 0 messages in order for a ping operation to succeed.
  1. Scanners or utilities that provide the ability to send custom ICMP queries.
Low
The adversary needs to know certain linux commands for this type of attack.
Confidentiality
Other (A successful attack of this kind can identify open ports and available services on a system.)

Not present