Echo Requests and Responses
Sniffing and Evasion
Last updated
Sniffing and Evasion
Last updated
This step-by-step guide will help you understand how ICMP Echo Requests and Responses work using the ping command and packet analysis with Wireshark.
To analyze ICMP packets in a network, verify connectivity, and understand how devices communicate using Echo Requests and Replies.
Configure two devices (PC1 and PC2) on the same network.
Assign IP addresses (PC1: 192.168.1.1)
:
Assign IP addresses (PC2: 192.168.1.2)
Verify the connectivity between both devices.
Open Wireshark on PC1.
Start capturing packets on the active network interface.
Use the filter:
Analyze the Echo Request (Type 8) and Echo Reply (Type 0) packets.
Echo Request (Sent by PC1):
Type: 8
(Request)
Code: 0
Identifier & Sequence Number
Echo Reply (Received from PC2):
Type: 0
(Reply)
Code: 0
Same Identifier & Sequence Number
If there is no response:
Check firewall settings (ICMP might be blocked).
Ensure IP addresses are correctly assigned.
Verify physical and network connectivity.
ICMP
, ping command
, echo request
, echo reply
, Wireshark
, network troubleshooting
, packet analysis
, network connectivity
, Type 8
, Type 0
, ICMP filter
, identifier
, sequence number
, packet capture
, network diagnostics
, firewall settings
, network interface
, IP configuration
, connectivity issues
, network security
, وایرشارک