ICMP Flood
A flood of ICMP Echo Requests (pings) comes in from one host (DoS) or multiple hosts (DDos)
ICMP Echo Request and Echo Reply
Used to perform host verification and DoS attacks.
ICMP unreachable
Used to perform network reconnaissance and scanning attacks.
ICMP Mask Reply
Used to map an internal IP network.
ICMP redirects
This is used to lure a target into sending all traffic through a compromised device and create a MiTM attack.