ICMP Redirect Attacks

What are ARP Cache Poisoning Attacks?

ICMP (Internet Control Message Protocol) Redirect Attacks are a form of network attack where an attacker sends malicious ICMP redirect messages to a victim's computer, tricking it into routing traffic through an attacker-controlled gateway.

How Do They Work?

In an ICMP redirect attack, the attacker sends a forged ICMP redirect message to a target system. This message convinces the target that a different gateway (controlled by the attacker) should be used for routing. This can lead to several security issues, including:

Traffic Interception: The attacker can intercept and eavesdrop on network traffic between the target and other devices.
Man-in-the-Middle:It enables man-in-the-middle attacks where the attacker relays and potentially modifies the intercepted traffic.
Network Manipulation: The attack can disrupt network communication and lead to unauthorised routing.

Why are they dangerous?

ICMP redirect attacks can have serious consequences:

Data Interception:Attackers can intercept sensitive data, such as login credentials, on a compromised network.
Data Tampering: Malicious actors can modify data in transit, leading to data integrity issues.
Network Disruption:These attacks can disrupt network services, causing downtime and operational disruptions.

How to Prevent ICMP Redirect Attacks?

Preventing ICMP redirect attacks involves:

Filtering ICMP:Implement mechanisms to detect and mitigate ARP spoofing, such as ARPwatch or intrusion detection systems.
Host Configuration: Configure systems to ignore ICMP redirects or use static routes when appropriate.
Network Segmentation: Isolate sensitive network segments to limit the impact of attacks.
Network Monitoring: Continuously monitor network traffic for suspicious ICMP redirects.

Return to Network Security