ICMP Fingerprinting Probes |
Attack Pattern ID: 316 (Standard Attack Pattern) | Typical Severity: Low | Status: Draft |
Summary
An attacker engages in ICMP stack fingerprinting techniques to determine the operating system type and version of a remote target. The role of ICMP as an ubiquitous diagnostic messaging protocol means that ICMP fingerprinting techniques are applicable to almost any internet host in a similar manner as TCP. ICMP fingerprinting techniques involve the generation of ICMP messages and analyzing the responses. This method is limited in that most firewalls are configured to block ICMP messages for security reasons, so it is most effective when used on an internal network segment. OS fingerprints using ICMP usually involve multiple different probes as the information returned from any one probe is usually insufficient to support a reliable OS inference.
Target Attack Surface Description
Targeted OSI Layers: Network Layer
Target Attack Surface Localities
Target Attack Surface Types: Host
Target Functional Services
Target Functional Service 1: None | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Protocol 1: ICMP | ||||||||||||||||||
|
The ability to generate and analyze ICMP messages from a target. In cases where certain message types are blocked by a firewall, the reliability of ICMP fingerprinting declines sharply.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 312 | Active OS Fingerprinting | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 329 | ICMP Error Message Quoting Probe | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 330 | ICMP Error Message Echoing Integrity Probe | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 331 | ICMP IP Total Length Field Probe | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 332 | ICMP IP 'ID' Field Error Message Probe | Mechanism of Attack (primary)1000 |