Intrusion Prevention



This indicates detection of an Internet Control Message Protocol (ICMP) echo request that has possibly originated from a Windows host running CyberKit 2.2.
An ICMP echo request is used to detect whether a host in the network is active. A remote attacker may use it to gain information about hosts on a target network and use this information for attack planning.

Affected Products

Any unprotected system connected to the Internet is vulnerable to the attack.


An attacker can gather information about live hosts in a network prior to launching an attack.

Recommended Actions


CVE References