On TCP/IP networks, a packet can be sent to an individual computer or broadcast to all computers on the network. When an IP packet is sent to an IP broadcast address from a computer on the same local area network, all computers on that network receive the IP packet. When a computer outside the local area network sends an IP broadcast packet, all computers on the target network receive the broadcast packet (as long as the routers have been configured to forward these broadcast packets).
Three parties are involved in these attacks: the attacker, the intermediary, and the victim. The intermediary can also be a victim. The intermediary receives an ICMP echo request packet that is directed to the IP broadcast network address. If nothing is filtering these ICMP echo requests, all computers on the network will receive the ICMP echo request packet and respond with an ICMP echo reply packet. When all computers respond to these packets, severe network congestion or outages are possible.
When the attackers create these packets, they do not use their own IP source address. Instead, they use the source address of their intended victim. This is known as IP spoofing. The result is that when the intermediary computers respond to the ICMP echo request packet, they send the reply packet to the victim's IP address. The victim's computer is now subjected to network congestion that could cause the network to stop responding.
Attackers have developed a variety of tools for this purpose. The tools enable the hackers to send ICMP echo request packets to multiple intermediary computers, causing all of them to respond to the same victim's source IP address. These tools could also be used to scan for network routers that do not filter broadcast traffic.
On TCP/IP networks, a packet can be sent to an individual computer or broadcast to all computers on the network. When an IP packet is sent to an IP broadcast address from a computer on the same local area network, all computers on that network receive the IP packet. When a computer outside the local area network sends an IP broadcast packet, all computers on the target network receive the broadcast packet (as long as the routers have been configured to forward these broadcast packets).
Three parties are involved in these attacks: the attacker, the intermediary, and the victim. The intermediary can also be a victim. The intermediary receives an ICMP echo request packet that is directed to the IP broadcast network address. If nothing is filtering these ICMP echo requests, all computers on the network will receive the ICMP echo request packet and respond with an ICMP echo reply packet. When all computers respond to these packets, severe network congestion or outages are possible.
When the attackers create these packets, they do not use their own IP source address. Instead, they use the source address of their intended victim. This is known as IP spoofing. The result is that when the intermediary computers respond to the ICMP echo request packet, they send the reply packet to the victim's IP address. The victim's computer is now subjected to network congestion that could cause the network to stop responding.
Attackers have developed a variety of tools for this purpose. The tools enable the hackers to send ICMP echo request packets to multiple intermediary computers, causing all of them to respond to the same victim's source IP address. These tools could also be used to scan for network routers that do not filter broadcast traffic.
การแปล กรุณารอสักครู่..