ICMP Tunnel
Tunneling protocol, Internet Control Message Protocol, Covert channel
978-620-1-60050-8
6201600507
136
2013-08-13
29.00 €
eng
https://images.our-assets.com/cover/230x230/9786201600508.jpg
https://images.our-assets.com/fullcover/230x230/9786201600508.jpg
https://images.our-assets.com/cover/2000x/9786201600508.jpg
https://images.our-assets.com/fullcover/2000x/9786201600508.jpg
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. An ICMP tunnel establishes a covert connection between two remote computers, using ICMP echo requests and reply packets. An example of this technique is tunneling complete TCP traffic over ping requests and replies. ICMP tunneling works by injecting arbitrary data into an echo packet sent to a remote computer. The remote computer replies in the same manner, injecting an answer into another ICMP packet and sending it back. The client performs all communication using ICMP echo request packets, while the proxy uses echo reply packets. In theory, it is possible to have the proxy use echo request packets, but these packets are not necessarily forwarded to the client, as the client could be behind a translated address. This bidirectional data flow can be abstracted with an ordinary serial line.
https://morebooks.de/books/fr/published_by/tempor/193168/products
Informatique, IT
https://morebooks.de/store/fr/book/icmp-tunnel/isbn/978-620-1-60050-8