Horizons 1500WR Wireless 4-Port Router
85
ParkerVision
11.4.2 Types of DoS Attacks - Continued
ICMP Vulnerability
ICMP is an error-reporting protocol that works in concert with IP. The following ICMP types trigger an
alert:
Illegal Commands (NetBIOS and SMTP)
The only legal NetBIOS commands are the following - all others are illegal.
All SMTP commands are illegal except for those displayed in the following table.
Traceroute
Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes
when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining
knowledge of the network topology inside the firewall.
4. Often, many DoS attacks also employ a technique known as
“IP Spoofing”
as part of their attack.
IP Spoofing may be used to break into systems, to hide the hacker’s identity, or to magnify the effect
of the DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers by
tricking a router or firewall into thinking that the communications are coming from within the trusted
network. To engage in IP spoofing, a hacker must modify the packet headers so that it appears that the
packets originate from a trusted host and should be allowed through the router or firewall. The 1500WR
Wireless Router blocks all IP Spoofing attempts.