ICMP Flooding – Denial of Service

By Aanand babu - SME Vulnerability Assessment

What Attack to do when there is no Ports opened on you target ??(ICMP Flooding)

Hi all, most of you will be either working as consultant, freelancer or cyber security enthusiast and most of have had gone through a situation where there is no ports or service is enabled to perform penetration Test in this time you can check for ping service. if ping service is there then we can preform ICMP attacks, since ping is working with ICMP protocol.

Here we will be using the https://www.hackthissite.org/ as our target.

HackThisSite.org is a free, safe and legal training ground for hackers to test and expand their ethical hacking skills with challenges, CTFs, and more
Here we have the ping service enabled. so we can try ICMP Attacks, Common ICMP attacks are related to DOS, here we are using ICMP flood Attack.

What is ping/ICMP flood attack ?

Attackers frequently attempt to overload a targeted device with ICMP echo-requests in a Denial-of-Service (DoS) assault known as an Internet Control Message Protocol (ICMP) flood DDoS attack, also referred to as a Ping flood attack (pings). A network device is typically pinged using ICMP echo-request and echo-reply messages to check on its connectivity, health, and the connection between the sender and the recipient. The target is overloaded with request packets, forcing the network to respond with an equal amount of reply packets. By doing this, the target is rendered impassable to regular traffic.

How to perform an ICMP Flooding ?

Am using kali linux to launch this attack. On kali we have hping3 which we are will be using to run the attack

1. hping3 --icmp --flood <target>

2.you can open another window and try pinging to the target to see if the ping communication happening flawlessly.
3.Use Wireshark to analyze the packets.
if you look the below wireshark data you can clearly understand the attack structure.
Thanks for reading and Happy Hacking all