Before looking at how to mitigate a Smurf attack, let’s first understand what it is and why it’s such a problem. A Smurf works on a weakness of IP and ICMP by sending an ICMP packet to the broadcast address of a network. For example, I could send an ICMP (Ping packet) to every computer […]
IP spoofing is the act of camouflaging your IP address to make it look like you are someone else. Although IP spoofing is not an attack by itself, it is the starting point of many of the most common attacks found on today’s networks. Most, but not all, of the spoofing attacks that take place […]
Additional configuration to further lockdown Cisco router security.