What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes
a primary and secondary victim?

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes
a primary and secondary victim?

A.
Fraggle Attack

B.
Man in the Middle Attack

C.
Trojan Horse Attack

D.
Smurf Attack

E.
Back Orifice Attack

Explanation:
Trojan and Back orifice are Trojan horse attacks.Man in the middle spoofs the Ip and redirects the
victems packets to the cracker The infamous Smurf attack. preys on ICMP’s capability to send
traffic to the broadcast address. Many hosts can listen and respond to a single ICMP echo request
sent to a broadcast address.
Network Intrusion Detection third Edition by Stephen Northcutt and Judy Novak pg 70 The “smurf”
attack’s cousin is called “fraggle”,which uses UDP echo packets in the same fashion as the ICMP
echo packets; it was a simple re-write of “smurf”.



Leave a Reply 0

Your email address will not be published. Required fields are marked *