This documentation outlines the usage of ICMP protocol in the scanning process. This documentation also, in Step-by-Step process, uncovers each of the malicious computer attacker techniques using the ICMP protocol. A few new scanning techniques will