Guardians’ Codex: Understanding ICMP — The Internet’s Backstage Messenger

Explained by Pedro, Network Specialist from the DANRESA team

“You might think computers only exchange files and videos online.

But behind the scenes, they’re constantly sending short messages to each other just to make sure everything is working.

That’s where ICMP comes in.”


What Is ICMP?

ICMP stands for Internet Control Message Protocol.

It is part of the IP family, but unlike protocols that carry content (like web pages or videos), ICMP carries control and status messages.

Think of ICMP as the internet’s internal messaging system.

It allows devices to say things like:

  • “I couldn’t deliver this packet.”
  • “That destination is unreachable.”
  • “Are you online?”
  • “This route is taking too long.”

ICMP doesn’t move your data — it explains what’s happening to your data.


Common ICMP Message Types

ICMP Message Type

What It Means

  • Echo Request / Echo Reply Used by the ping command to check if a device is online
  • Destination Unreachable The packet couldn’t reach its destination
  • Time Exceeded The packet expired before arriving (TTL ran out)
  • Redirect Message Suggests a better route for sending data
  • Source Quench (obsolete) Previously used to ask senders to slow down

How ICMP Works in Real Life

Let’s take the most common example: ping.

When you type:

ping http://www.example.com

Here’s what happens:

  1. Your computer sends an ICMP Echo Request
  2. The destination server responds with an ICMP Echo Reply
  3. Your system measures response time (latency)
  4. It checks for packet loss

This helps you understand whether:

  • The server is online
  • The connection is slow
  • The network path is congested

Why ICMP Is So Important

ICMP plays a critical role in networking and cybersecurity because it:

  • Helps diagnose network problems
  • Confirms whether systems are reachable
  • Supports tools like ping and traceroute
  • Explains why connections fail

Without ICMP, networks would still break — but no one would know why.


Security Risks Involving ICMP

Even though ICMP is extremely useful, it can be abused if not properly controlled.

Examples include:

  • Denial of Service attacks using ICMP floods
  • “Ping of Death” attacks with malformed packets
  • Network reconnaissance to discover active devices

That’s why secure environments, like those designed by DANRESA, monitor, filter, or rate-limit ICMP traffic instead of blocking it completely.


A Guardian’s Analogy

Imagine the internet as a massive neighborhood.

  • Data packets are deliveries
  • Computers are houses
  • ICMP is the smart messenger

The messenger reports things like:

  • “That house doesn’t exist.”
  • “The road is blocked.”
  • “Delivery is delayed.”
  • “Try a different street.”

Without this messenger, deliveries would fail silently — and chaos would follow.


Guardian Summary

  • ICMP is a control protocol used by the internet
  • It reports errors and connection status
  • It does not carry user data
  • It powers tools like ping and traceroute
  • It must be monitored to avoid abuse

Understanding ICMP means understanding how the internet communicates when things go wrong — and that knowledge is essential for any future Guardian of the network.

Deixe uma resposta

More Articles & Posts

Descubra mais sobre Cyber Heroes League

Assine agora mesmo para continuar lendo e ter acesso ao arquivo completo.

Continue reading