IPv4 Header Fields
IPv6 Header Fields
IP Vulnerabilities
ICMP Attack Messages
TCP Services
100

Specifies the length of the IP packet including the IP header and the user data.

Total length

100

This 8-bit field is equivalent to the IPv4 Differentiated Services (DS) field.

Traffic Class

100

Threat actors attempt to prevent legitimate users from accessing information or services.

Denial-of-Service (DoS) attacks

100

This is used to perform host verification and DoS attacks.

ICMP echo request and echo reply

200
  • A value that is calculated based on the contents of the IP header.
  • Used to determine if any errors have been introduced during transmission.

Header checksum

200
  • This 8-bit field replaces the IPv4 TTL field.
  • This value is decremented by a value of 1 by each router that forwards the packet.

Hop Limit

200

Threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication. They could simply eavesdrop by inspecting captured packets or alter packets and forward them to their original destination.

Man-in-the-middle attack (MiTM)

200

This is used to perform network reconnaissance and scanning attacks.

ICMP unreachable

300

Contains an 8-bit binary value that is used to limit the lifetime of a packet.

Time-to-Live (TTL)

300

This 20-bit field suggests that all packets with the same (-----) receive the same type of handling by routers.


Flow Label

300

Threat actors faking the source IP address in an attempt to perform attacks.

Address spoofing attacks

300

This is used to lure a target host into sending all traffic through a compromised device and create a MiTM attack.

ICMP redirects

300

Rather than acknowledge one segment at a time, multiple segments can be acknowledged with a single acknowledgment segment.

Flow control

400

As an IP packet moves through the internet, it might need to cross a route that cannot handle the size of the packet.

Identification, Flag, and Fragment offset

400
  • This 8-bit field is equivalent to the IPv4 Protocol field.
  • It indicates the data payload type that the packet is carrying, enabling the network layer to pass the data to the appropriate upper-layer protocol.

Next Header

400

Threat actors gain access to the physical network, and then use an MiTM attack to gain control of a session.

Session hijacking

400

This is used to inject bogus route entries into the routing table of a target host.

ICMP router discovery

400

TCP incorporates acknowledgments to guarantee delivery, instead of relying on upper-layer protocols to detect and resolve errors. If a timely acknowledgment is not received, the sender retransmits the data. Requiring acknowledgments of received data can cause substantial delays. 

Reliable delivery

500

Formerly called the Type of Service (ToS) field, the (--) field is an 8-bit field used to determine the priority of each packet.

Differentiated Services or DiffServ (DS)

500

Threat actors use echo packets (pings) to discover subnets and hosts on a protected network, to generate DoS flood attacks, and to alter host routing tables.

ICMP attacks


500

This is used to map an internal IP network.

ICMP mask reply

500

Occurs during the TCP three-way handshake. Before data can be transferred using TCP, a three-way handshake opens the TCP connection. If both sides agree to the TCP connection, data can be sent and received by both parties using TCP.

Stateful communication

M
e
n
u