enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Internet Control Message Protocol - Wikipedia

    en.wikipedia.org/wiki/Internet_Control_Message...

    The related ping utility is implemented using the ICMP echo request and echo reply messages. ICMP uses the basic support of IP as if it were a higher-level protocol, however, ICMP is actually an integral part of IP. Although ICMP messages are contained within standard IP packets, ICMP messages are usually processed as a special case ...

  3. Smurf attack - Wikipedia

    en.wikipedia.org/wiki/Smurf_attack

    The dual unicast form is comparable with a regular ping: an ICMP echo request is sent to the patsy (a single host), which sends a single ICMP echo reply (a Smurf) back to the target (the single host in the source address). This type of attack has an amplification factor of 1, which means: just a single Smurf per ping.

  4. traceroute - Wikipedia

    en.wikipedia.org/wiki/Traceroute

    Proceeding in this way, traceroute uses the returned ICMP Time Exceeded messages to build a list of routers that packets traverse, until the destination is reached and returns an ICMP Destination Unreachable message if UDP packets are being used or an ICMP Echo Reply message if ICMP Echo messages are being used. [10]

  5. ping (networking utility) - Wikipedia

    en.wikipedia.org/wiki/Ping_(networking_utility)

    Pinging involves sending an ICMP echo request to the target host and waiting for an ICMP echo reply. The program reports errors, packet loss , and a statistical summary of the results, typically including the minimum, maximum, the mean round-trip times, and standard deviation of the mean.

  6. Stateful firewall - Wikipedia

    en.wikipedia.org/wiki/Stateful_firewall

    A stateful firewall keeps track of the state of network connections, such as TCP streams, UDP datagrams, and ICMP messages, and can apply labels such as LISTEN, ESTABLISHED, or CLOSING. [2] State table entries are created for TCP streams or UDP datagrams that are allowed to communicate through the firewall in accordance with the configured ...

  7. IP fragmentation attack - Wikipedia

    en.wikipedia.org/wiki/IP_fragmentation_attack

    IP fragmentation attacks are a kind of computer security attack based on how the Internet Protocol (IP) requires data to be transmitted and processed. Specifically, it invokes IP fragmentation, a process used to partition messages (the service data unit (SDU); typically a packet) from one layer of a network into multiple smaller payloads that can fit within the lower layer's protocol data unit ...

  8. ICMP tunnel - Wikipedia

    en.wikipedia.org/wiki/ICMP_tunnel

    ICMP tunneling works by injecting arbitrary data into an echo packet sent to a remote computer. The remote computer replies in the same manner, injecting an answer into another ICMP packet and sending it back. The client performs all communication using ICMP echo request packets, while the proxy uses echo reply packets.

  9. ICMP hole punching - Wikipedia

    en.wikipedia.org/wiki/ICMP_hole_punching

    ICMP hole punching is a technique employed in network address translator (NAT) applications for maintaining Internet Control Message Protocol (ICMP) packet streams that traverse the NAT. NAT traversal techniques are typically required for client-to-client networking applications on the Internet involving hosts connected in private networks ...