An adversary uses a technique to generate an ICMP Error message (Port Unreachable, Destination Unreachable, Redirect, Source Quench, Time Exceeded, Parameter Problem) from a target and then analyze the integrity of data returned or \'Quoted\' from the originating request that generated the error message.
Description
Consequences
Relationships
Resources Required
1