Which method is typically used to discover reachable hosts behind a firewall by sending ICMP Echo requests?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which method is typically used to discover reachable hosts behind a firewall by sending ICMP Echo requests?

Explanation:
Direct TTL Probes rely on sending ICMP Echo requests with controlled TTL values to reveal hosts beyond a firewall. By setting a low TTL, probes either die at an intermediate router (producing Time Exceeded messages) or reach the actual destination, where an Echo Reply can confirm reachability. This approach helps identify which internal hosts are reachable from outside the firewall and can help map what lies beyond filtering. The other options aren’t about discovering hosts behind a firewall using ICMP Echo in the same way: IP Address Decoy is about spoofing addresses to mislead defenses; a packet builder is just a tool for crafting packets; and Source Routing concerns route selection rather than discovering internal hosts via ICMP.

Direct TTL Probes rely on sending ICMP Echo requests with controlled TTL values to reveal hosts beyond a firewall. By setting a low TTL, probes either die at an intermediate router (producing Time Exceeded messages) or reach the actual destination, where an Echo Reply can confirm reachability. This approach helps identify which internal hosts are reachable from outside the firewall and can help map what lies beyond filtering. The other options aren’t about discovering hosts behind a firewall using ICMP Echo in the same way: IP Address Decoy is about spoofing addresses to mislead defenses; a packet builder is just a tool for crafting packets; and Source Routing concerns route selection rather than discovering internal hosts via ICMP.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy