1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sunny_sXe [5.5K]
3 years ago
9

You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.

Your supervisor asks for a list of ICMPv6 traffic or issues that are of concern and the reasons why such concerns could be a problem. Build a list for your supervisor. Include packet types or specific circumstances in which ICMPv6 traffic could compromise network security.
Computers and Technology
1 answer:
DedPeter [7]3 years ago
8 0

ICMPv6 is used by IPv6 nodes to report errors encountered in processing packets, and to perform other internet-layer functions, such as diagnostics.  An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests.

Explanation:

Issues that are of concern which could be a problem include :

Denial-of-Service Attacks  

  • ICMPv6 can be used to cause a denial of service (DoS) in a number of  ways, including simply sending excessive numbers of ICMPv6 packets to destinations in the site and sending error messages that disrupt  established communications by causing sessions to be dropped.

Probing

  • A major security consideration is preventing attackers from probing  the site to determine the topology and identify hosts that might be vulnerable to attack.  Carefully crafted but, often, malformed  messages can be used to provoke ICMPv6 responses from hosts thereby  informing attackers of potential targets for future attacks.  However, the very large address space of IPv6 makes probing a less effective weapon as compared with IPv4 . Redirection Attacks

Redirection Attacks

  • A redirection attack could be used by a malicious sender to perform  man-in-the-middle attacks or divert packets either to a malicious  monitor or to cause DoS by blackholing the packets.  These attacks would normally have to be carried out locally on a link using the Redirect message.  Administrators need to decide if the improvement  in efficiency from using Redirect messages is worth the risk of  malicious use.  Factors to consider include the physical security of   the link and the complexity of addressing on the link

Renumbering Attacks

  • Spurious Renumbering messages can lead to the disruption of a site.  Although Renumbering messages are required to be authenticated with  IPsec, so that it is difficult to carry out such attacks in practice,  they should not be allowed through a site boundary firewall.  On the  other hand, a site may employ multiple "layers" of firewalls.

Problems Resulting from ICMPv6 Transparency

  • Because some ICMPv6 error packets need to be passed through a  firewall in both directions, malicious users can potentially use  these messages to communicate between inside and outside, bypassing  administrative inspection.

Packet types or specific circumstances in which ICMPv6 traffic could compromise network security :

Ping sweep — A type of attack that uses ICMP echo request messages to enumerate live hosts on a network.

Ping flood — Utilized to launch a denial of service attack (DoS), where the attacker sends ICMP requests in a rapid succession without waiting for the targeted system to respond.

ICMP tunneling — A method used to establish a covert communication channel between remote systems, most times between a client and a proxy. All communications are sent via ICMP requests and replies

Forged ICMP redirects —  The attacker would send a ICMP redirect message, which informs a host of a direct path to a destination, to the victim that contains the IP addresses of the attacker’s system. This allows an attacker to compromise network traffic via a man-in-the-middle attack or cause a DoS.

You might be interested in
Which image-editing tool can be used to help remove spots and other marks from an image?
Mrac [35]
C. Healing brush
That’s the answer
5 0
3 years ago
Rebecca has finished with the research and outline portion of her slide presentation now the next logical step is to begin worki
e-lub [12.9K]

Answer:

The answer is creating and layout and template style

Explanation:

APEX VERIFIED just did it

4 0
3 years ago
Read 2 more answers
how do i create an advanced search using the search criteria in the range K2:S3 and the inventory data where the results will be
valentina_108 [34]

Create an advanced search using the search criteria in the range K2:S3 and the inventory data where the results will be displayed in the search results (starting in cell K10).

Explanation:

  • In cell B2, enter the value from A7.
  • Insert a function in D2 that will return the arrival date of any vehicle based on  which VIN is entered in B2 (Hint: Start with an INDEX function. Before you use a  nested MATCH function, specify which column number you will be returning.)
  • Insert a function in F2 that will return the Special Notes of any vehicle based on  which VIN is entered in B2 (Use the same hint from the previous step.)
  • Enter the following values for the advanced search criteria in the range K3S3:
  1. Year = 2018
  2. Type = Sedan
  3. GPS = Yes
  • Create an advanced filter using the search criteria in the range K2:S3 and the  inventory data where the results will be displayed in the search results (starting in  K10).
  • Verify results populate as expected.
6 0
3 years ago
Process is useful for a quick turnaround in game development?
aleksley [76]
Rapid prototyping as it allows the production of a functional program in a short time
7 0
3 years ago
Read 2 more answers
You created an outline within a worksheet. what does the button indicate to the left of a row heading?
cricket20 [7]
<span>Business Name (default field), State (correct field)</span>
3 0
3 years ago
Other questions:
  • Which piece of personal information do websites often require users to enter?
    6·2 answers
  • By issuing concert tickets on the blockchain, fans can verify transfer of ownership from one digital wallet to another, rather t
    14·1 answer
  • What is the sum of each pair of binary integers? (assuming 8-bit register is used)
    5·1 answer
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • When compared to defender and analyzer firms, early adopters of new technologies tend to be?
    13·2 answers
  • Write out code for a nested if statement that allows a user to enter in a product name, store the product into a variable called
    8·1 answer
  • Using the Insert tab, you can convert text into a table and a table into text.
    15·1 answer
  • Demons I shall be your eternal nightmare
    13·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!