Echo Requests and Responses
Sniffing and Evasion
This step-by-step guide will help you understand how ICMP Echo Requests and Responses work using the ping command and packet analysis with Wireshark.
Goal:
To analyze ICMP packets in a network, verify connectivity, and understand how devices communicate using Echo Requests and Replies.
Step 1: Network Setup
Configure two devices (PC1 and PC2) on the same network.

Assign IP addresses (PC1:
192.168.1.1):
Assign IP addresses (PC2:
192.168.1.2)
Step 2: Using the Ping Command
Verify the connectivity between both devices.
Step 3: Capturing ICMP Packets with Wireshark
Open Wireshark on PC1.
Start capturing packets on the active network interface.
Use the filter:
Analyze the Echo Request (Type 8) and Echo Reply (Type 0) packets.

Step 4: Analyzing the Packet Details
Echo Request (Sent by PC1):
Type:
8(Request)Code:
0Identifier & Sequence Number

Echo Reply (Received from PC2):
Type:
0(Reply)Code:
0Same Identifier & Sequence Number

Step 5: Troubleshooting Network Connectivity Issues
If there is no response:
Check firewall settings (ICMP might be blocked).
Ensure IP addresses are correctly assigned.
Verify physical and network connectivity.
Keywords:
ICMP, ping command, echo request, echo reply, Wireshark, network troubleshooting, packet analysis, network connectivity, Type 8, Type 0, ICMP filter, identifier, sequence number, packet capture, network diagnostics, firewall settings, network interface, IP configuration, connectivity issues, network security, وایرشارک
Last updated