Which ICMP technique queries the subnet mask from the target?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which ICMP technique queries the subnet mask from the target?

Explanation:
The idea being tested is how ICMP messages can reveal network configuration details. Asking for the subnet mask is done with an ICMP Address Mask Request, which is a specific ICMP message designed to elicit the subnet mask from the target. If the device supports this, it replies with the Address Mask Reply containing the mask (for example, 255.255.255.0). This is different from a standard ping, which uses an ICMP Echo Request to check reachability and does not disclose the mask. It’s also different from an ICMP timestamp ping, which returns timing information, and from a TCP SYN probe, which operates at the transport layer and doesn’t use ICMP at all. So the technique that queries the subnet mask is ICMP address mask ping.

The idea being tested is how ICMP messages can reveal network configuration details. Asking for the subnet mask is done with an ICMP Address Mask Request, which is a specific ICMP message designed to elicit the subnet mask from the target. If the device supports this, it replies with the Address Mask Reply containing the mask (for example, 255.255.255.0). This is different from a standard ping, which uses an ICMP Echo Request to check reachability and does not disclose the mask. It’s also different from an ICMP timestamp ping, which returns timing information, and from a TCP SYN probe, which operates at the transport layer and doesn’t use ICMP at all. So the technique that queries the subnet mask is ICMP address mask ping.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy