By the end of this section, you will be able to:
● Understand the concept and impact of ICMP flooding attacks.
● Execute an ICMP flood to overwhelm a target system (PC1).
● Monitor and analyze the effects of the attack on system responsiveness.
In this exercise, you will gain hands-on experience with:
● The mechanics of ICMP flooding, a type of Denial-of-Service (DoS) attack.
● How excessive ICMP Echo Request packets can exhaust system resources.
● Tools used to perform ICMP floods, such as
● How to target PC1 and observe its behavior under attack.