Dark Mode

Settings

Capec-298 Detail

UDP Ping

Detailed Software Typical Severity: Low

Parents: 292

Threats: T60 T65 T80 T258 T273 T288 T291 T302 T334 T392 T407

Description

An adversary sends a UDP datagram to the remote host to determine if the host is alive. If a UDP datagram is sent to an open UDP port there is very often no response, so a typical strategy for using a UDP ping is to send the datagram to a random high port on the target. The goal is to solicit an 'ICMP port unreachable' message from the target, indicating that the host is alive. UDP pings are useful because some firewalls are not configured to block UDP datagrams sent to strange or typically unused ports, like ports in the 65K range. Additionally, while some firewalls may filter incoming ICMP, weaknesses in firewall rule-sets may allow certain types of ICMP (host unreachable, port unreachable) which are useful for UDP ping attempts.

Not present

External ID Source Link Description
CAPEC-298 capec https://capec.mitre.org/data/definitions/298.html
CWE-200 cwe http://cwe.mitre.org/data/definitions/200.html
REF-33 reference_from_CAPEC Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions (6th Edition), 2009, McGraw Hill
REF-158 reference_from_CAPEC http://www.faqs.org/rfcs/rfc768.html J. Postel, RFC768 - User Datagram Protocol, 1980--08---28
REF-125 reference_from_CAPEC http://nmap.org/docs/discovery.pdf Mark Wolfgang, Host Discovery with Nmap, 2002--11
REF-34 reference_from_CAPEC Gordon "Fyodor" Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (3rd "Zero Day" Edition,), 2008, Insecure.com LLC, ISBN: 978-0-9799587-1-7

Not present

  1. The adversary requires the ability to send a UDP datagram to a remote host and receive a response.
  2. The adversary requires the ability to craft custom UDP Packets for use during network reconnaissance.
  3. The target's firewall must not be configured to block egress ICMP messages.
  1. UDP pings can be performed via the use of a port scanner or by raw socket manipulation using a scripting or programming language. Packet injection tools are also useful for this purpose. Depending upon the technique used it may also be necessary to sniff the network in order to see the response.

Not present

Authorization Access Control Confidentiality
Bypass Protection Mechanism Bypass Protection Mechanism Other
Hide Activities Hide Activities Bypass Protection Mechanism
Hide Activities

Not present