Prerequisites
The adversary requires the ability to send a UDP datagram to a remote host and receive a response.
The adversary requires the ability to craft custom UDP Packets for use during network reconnaissance.
The target's firewall must not be configured to block egress ICMP messages.
Resources Required
UDP pings can be performed via the use of a port scanner or by raw socket manipulation using a scripting or programming language. Packet injection tools are also useful for this purpose. Depending upon the technique used it may also be necessary to sniff the network in order to see the response.
Mitigations
Configure your firewall to block egress ICMP messages.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
References
REF-33
Hacking Exposed: Network Security Secrets & Solutions
Stuart McClure, Joel Scambray, George Kurtz.
REF-158
RFC768 - User Datagram Protocol
J. Postel.
http://www.faqs.org/rfcs/rfc768.html REF-125
Host Discovery with Nmap
Mark Wolfgang.
http://nmap.org/docs/discovery.pdf REF-34
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon "Fyodor" Lyon.
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Prerequisites, Description, Description Summary, Related_Weaknesses, Resources_Required, Solutions_and_Mitigations |
CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated Related_Attack_Patterns |