ICMP Usage in Scanning: The Complete Know-How Anthony Pell 1 min read Nov 23, 2004 This documentation outlines the usage of ICMP protocol in the scanning process. This documentation also, in Step-by-Step process, uncovers each of the malicious computer attacker techniques using the ICMP protocol. A few new scanning techniques will ICMP Usage in Scanning: The Complete Know-How Prev: Introduction to IPv6 Next: Through the Tunnel