Validating vulnerabilities with ICMP interaction