- Practical Network Scanning
- Ajay Singh Chauhan
- 105字
- 2022-07-12 10:43:09
Mitigation
A simple solution to this problem is to stop ICMP totally. ICMP can be stopped on a firewall layer, network layer or even on a host layer. We understand that ICMP is a very common troubleshooting tool for network admin and system admin, but instead of relying upon an ICMP based ping, we should rely upon a TCP ping. Such scans can also be detected and stopped by the IPS/IDS system.
For a host-based example, ICMP Echo can be easily blocked on Windows by configuring an inbound rule. A new rule can be created by using the utility wf.msc from the Windows system:

推薦閱讀
- Android應用安全實戰:Frida協議分析
- 白帽子講Web安全(紀念版)
- 黑客攻防技巧
- 開發者的Web安全戒律:真實威脅與防御實踐
- Mastering Kali Linux for Advanced Penetration Testing
- 網絡安全技術及應用(第3版)
- Building a Home Security System with BeagleBone
- 物聯網安全滲透測試技術
- Kerberos域網絡安全從入門到精通
- Web安全之深度學習實戰
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網絡服務安全與監控
- 網絡空間安全實戰基礎
- 隱私保護機器學習
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)