By the end of this section, you will be able to:
● Understand the concept of ICMP reflection/amplification attacks.
● Execute an ICMP-based attack from a Kali-Attacker machine that causes multiple devices to send replies to PC1.
● Analyze the impact of the attack on PC1’s network performance and responsiveness.
In this exercise, you will gain hands-on experience with:
● The mechanics of ICMP reflection attacks, where spoofed requests cause other devices to respond to the victim.
● How to craft ICMP Echo Requests with a spoofed source IP (PC1’s IP) using tools like
● How to monitor PC1’s network interface for incoming ICMP traffic using tools