Threat Hunting-ICMP Traffic Analysis

Overview ICMP (Internet Control Message Protocol) Internet Control Message Protocol, which is used to send control messages in TCP/IP networks and is used to transfer control messages between IP hosts and routers. Control messages refer to messages about the network itself, such as network connectivity, whether the host is reachable, and whether routes are available. […]

HCIA: ICMP, Telnet, DHCP

ICMP belongs to the network layer—-IP and ARP also belong to the network layer Transport layer: TCP, UDP Huawei common basic commands <huawei>system-view—-Switch user view to system view [huawei]undo—-delete [huawei]quit—-Exit to the previous view [huawei]display—-View <huawei>reboot—-Restart the device [huawei]sysname—-Modify the system name display version—-View system version Telnet PC side—-use router to represent PC side [PC]interface […]

[Intranet Penetration] Covert communication tunnel technology to establish ICMP tunnel

1. Basic knowledge 1. Overview For general network communication, first establish a TCP connection between the two machines, and then perform normal data communication. When the P address is known, the message can be sent directly: if the P address is not known, the domain name needs to be resolved into the P address. In […]

[Linux5.4] [TUN] Simple use case – simulate ICMP_ECHO packet (ping initiated)

[Linux5.4][TUN] Simple use case – simulate ICMP_ECHO packet (ping initiated) I have written a simple example of simulating ICMP_ECHOREPLY before. Here is a simple example of using the tun module to initiate a ping, which is an example of the ICMP_ECHO packet. IP header verification //IP header verification uint16_t ip_checksum(uint16_t *buf, int size) {<!– –> […]

International Control Message Protocol ICMP

International Control Message Protocol ICMP Introduction to ICMP ICMP is used by hosts or routers to report error conditions and provide reports on anomalies (detecting network errors). ICMP is not a high-level protocol, but an IP layer protocol. **ICMP message format ** ICMP message type The first 4 bytes of the ICMP message are in […]

icmp message and its implementation using go

Table of Contents I. Overview 2. Detailed explanation of ICMP message format 2.1 What is ICMP 2.2 ICMP message format 2.3 ICMP message types 2.4 Actual message examples 3. Use go to implement icmp requests and receive response content 1. Overview This article mainly aims to learn the icmp message format and implement ICMP packet […]

[Chaohua Xishi] RT1060 ICMP hardware checksum insertion method

【Morning Blossoms at Dusk】RT1060 ICMP hardware checksum insertion method 1. Introduction to the article 2. Modification of function implementation code 2.1 Test platform 2.2 Code modification points 3. Test results 3.1 Remove the test packets of software checksum 3.2 Add test packets with hardware checksum enabled 1. Introduction to the article ICMP (Internet Control Message […]

Red Team Tunnel Application Chapter ICMP Protocol Transmission (8)

Introduction ICMP protocol ICMP (Internet Control Message Protocol), which stands for Internet Control Message Protocol, is a subprotocol of the TCP/IP protocol and is used to transmit control messages between IP hosts and routers. Control messages refer to messages about the network itself, such as network connectivity, whether the host is reachable, and whether routes […]