An adversary uses a technique to generate an ICMP Error message (Port Unreachable, Destination Unreachable, Redirect, Source Quench, Time Exceeded, Parameter Problem) from a target and then analyze the amount of data returned or \'Quoted\' from the originating request that generated the ICMP error message.
Description
Consequences
Relationships
Resources Required
1