Dark Mode
Capec-296 Detail
ICMP Information Request
Detailed Software Typical Severity: Low
Parents: 292
Threats: T60 T65 T80 T258 T273 T288 T291 T302 T334 T392 T407
An adversary sends an ICMP Information Request to a host to determine if it will respond to this deprecated mechanism. ICMP Information Requests are a deprecated message type. Information Requests were originally used for diskless machines to automatically obtain their network configuration, but this message type has been superseded by more robust protocol implementations like DHCP.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-296 | capec | https://capec.mitre.org/data/definitions/296.html | |
| CWE-200 | cwe | http://cwe.mitre.org/data/definitions/200.html | |
| REF-33 | reference_from_CAPEC | Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions (6th Edition), 2009, McGraw Hill | |
| REF-123 | reference_from_CAPEC | http://www.faqs.org/rfcs/rfc792.html | J. Postel, RFC792 - Internet Control Messaging Protocol, 1981--09, Defense Advanced Research Projects Agency (DARPA) |
| REF-124 | reference_from_CAPEC | http://www.faqs.org/rfcs/rfc1122.html | R. Braden, Ed., RFC1122 - Requirements for Internet Hosts - Communication Layers, 1989--10 |
| REF-125 | reference_from_CAPEC | http://nmap.org/docs/discovery.pdf | Mark Wolfgang, Host Discovery with Nmap, 2002--11 |
| REF-34 | reference_from_CAPEC | Gordon "Fyodor" Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (3rd "Zero Day" Edition,), 2008, Insecure.com LLC, ISBN: 978-0-9799587-1-7 |
Not present
- The ability to send an ICMP Type 15 Information Request and receive an ICMP Type 16 Information Reply in response.
- Scanners or utilities that provide the ability to send custom ICMP queries.
| Low |
|---|
| The adversary needs to know certain linux commands for this type of attack. |
| Confidentiality |
|---|
| Other |
Not present