Which method is typically used to discover reachable hosts behind a firewall by sending ICMP Echo requests?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which method is typically used to discover reachable hosts behind a firewall by sending ICMP Echo requests?

Explanation:
Direct TTL Probes rely on sending ICMP Echo requests with controlled TTL values to reveal hosts beyond a firewall. By setting a low TTL, probes either die at an intermediate router (producing Time Exceeded messages) or reach the actual destination, where an Echo Reply can confirm reachability. This approach helps identify which internal hosts are reachable from outside the firewall and can help map what lies beyond filtering. The other options aren’t about discovering hosts behind a firewall using ICMP Echo in the same way: IP Address Decoy is about spoofing addresses to mislead defenses; a packet builder is just a tool for crafting packets; and Source Routing concerns route selection rather than discovering internal hosts via ICMP.

Direct TTL Probes rely on sending ICMP Echo requests with controlled TTL values to reveal hosts beyond a firewall. By setting a low TTL, probes either die at an intermediate router (producing Time Exceeded messages) or reach the actual destination, where an Echo Reply can confirm reachability. This approach helps identify which internal hosts are reachable from outside the firewall and can help map what lies beyond filtering. The other options aren’t about discovering hosts behind a firewall using ICMP Echo in the same way: IP Address Decoy is about spoofing addresses to mislead defenses; a packet builder is just a tool for crafting packets; and Source Routing concerns route selection rather than discovering internal hosts via ICMP.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy