Which of the following is not a primary component of a smurf attack?
A.
ICMP
B.
IGMP
C.
Amplifying network
D.
IP spoofing
Explanation:
A smurf attack involves spoofing the source IP in a packet header, and then using it to bombard the victims network with ICMP ECHO replies. The smurf attack requires three players: the attacker, the victim, and the amplifying network.The attacker spoofs (changes the source IP address in a packet header) to make an ICMP ECHO REQUEST packet seem as though it originated at the victim’s system. This ICMP ECHO REQUEST message is broadcast to the amplifying network, which replies to the message in full force. The victim system and network are overwhelmed.