Unfortunately, ICMP is trusting -- not requiring any authentication between devices. This trusting nature can be exploited in a number of ways. ICMP-based network scans and exploits are often used to identify networking devices, applications or operating systems and attack network systems.
ICMP echo attacks
The DNS attacks of October 2002 were based on an old ICMP attack trick.
Numerous computers sent ICMP echo requests (also referred to as 'pings') to the root DNS servers. Since 12 of the 13 root DNS servers had ICMP ping enabled on them, they had to respond to each of these echo requests.
I advise clients to turn off ICMP echo response on all key devices within a company network and on the boarder of the Internet connection.
ICMP for service scanning
ICMP can be used to identify some services running on network systems as well.
If a UDP-based (User Datagram Protocol) communication is sent to a device that does not support the destination application, a "Destination Unreachable/Port Unreachable" ICMP message may be returned. The scanning system now knows that the application is not supported on the target.
For example, to determine whether DNS (Domain Name System) is supported on a target machine, a packet addressed to the DNS service (port 53) could be sent to the target. If the target sends back an ICMP Destination Unreachable/Port Unreachable message, we can figure that the target does not support DNS services. If any other response is received, we can conclude that the target does indeed support DNS services.
By scanning an entire network and listening to the ICMP responses, we can easily locate running services on a network. This technique is used by many scanning and multifunction tools such as nMap, LANGuard, and NetScanTools.
ICMP can be used to redirect traffic that is routed on a network.
This can cause a disruption in communications or enable a sniffer to listen in on traffic that normally would not be routed in the sniffer's direction. (Note that in this article, I am using the term 'sniffer' to denote a general packet analyzer -- I'm not referring specifically to the Sniffer Network Analyzer by Network Associates (although that tool would do nicely in this example.)
Redirection is normally used when a client sends data to a router that does not offer the best path to the destination. The receiving router sends an ICMP redirection message to a client to point the sender to another router on the network. The information is cached on the client's station (readable through the ROUTE PRINT command) and used the next time the client wants to communicate to the original destination network.
ICMP for OS fingerprinting
OS fingerprinting is the process of determining the operating system of a target.
Knowing this information is key when someone is planning an OS-specific attack. There are two types of OS fingerprinting techniques -- passive and active. Passive fingerprinting tools do not send any traffic on the wire -- they only listen and make decisions on the OS types based on what they hear.
Active OS fingerprinting tools, however, send a series of communications to the target. One of the key elements of active OS fingerprinting tools is ICMP. These active OS fingerprinting tools send a series of normal, malformed and unusual ICMP queries to a target and listen to the responses.
Figure 1 below shows the type of traffic seen on a network sniffer when an OS fingerprinting operation is underway.
The basic functionality of ICMP is documented in RFC (Request for Comment) 792 that can be found online at www.ietf.org. Reading this document can give you a basic overview of the different types of ICMP operations.Figure 1: Notice the ICMP packet with an invalid code, the ICMP Get address, ICMP Get timestamp, and ICMP Get information packets used in a LANGuard OS fingerprinting operation. Note: This trace is available online at http://www.packet-level.com/traceFiles.htm.
Given the popularity of ICMP amongst the hacking community, I highly recommend that you get familiar with this useful (but often harmful) protocol.
Laura Chappell is the Senior Protocol Analyst for the Protocol Analysis Institute. She is the author of numerous books and self-paced courseware available online at www.packet-level.com and www.podbooks.com.
This was first published in September 2003
This was first published in September 2003