Internet Control Message Protocol (ICMP)

The Internet Control Message Protocol (ICMP), often perceived as a simple network utility for diagnostics and error reporting, presents a surprisingly vast and complex attack surface. Its ubiquitous presence and generally permissive nature through network defences make it an ideal vehicle for a spectrum of offensive operations.

Disclaimer

An attack tree is structural, not operational. It exists in the comfortable world of pure logic, where things either work or they don’t, gates either open or stay closed, and time is merely a dimension I/you/we draw an arrow along.

It’s comprehensive. It has branches for sub-prefix hijacking, exact-prefix hijacking, squatting attacks, path manipulation, and several dozen other variations. Each node connects logically to its children. The structure is clean.

Until someone takes a tree seriously enough to ask but what would this actually *look* like?