Question
The Hans tool can be used to bypass firewalls by tunneling an IP connection over this protocol. This protocol’s “Fragmentation needed” messages are used to implement Path MTU Discovery, which is a big reason why networks shouldn’t filter out this protocol. In his “Harder Drive” project, Tom7 made a hard drive entirely contained in this protocol, along with a hard drive made from NES Tetris games and another from used COVID tests. The “Smurf” DDoS attack involves tricking a network into flooding a machine with this protocol. This protocol’s Time Exceeded and Destination Unreachable messages are used by (*) traceroute to map router hops. Unexpectedly large data is sent through this protocol in an attack named for a certain kind of packet “of death”. For 10 points, what protocol’s Echo Request and Echo Reply messages are used by a ubiquitous networking utility to check if a host is reachable? ■END■
ANSWER: ICMP [accept answers describing the ping protocol; accept Internet Control Message Protocol]
<AW>
= Average correct buzz position
Conv. % | Power % | Average Buzz |
---|
75% | 50% | 91.33 |
Back to tossups