Skip to content

g0rchy/icmprer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

92 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Description

An ICMP-based reverse shell written in C, nothing fancy, made it just for fun and to poke at some C/*nix programming concepts.

Usage

You can build the binaries by running make which needs sudo permissions to set the cap_net_raw capability:

  • bin/icmp-c2 is the C2 that sends commands to the implant (attacker)
  • bin/icmp-implant is the implant which executes commands and sends them back to the C2 (victim)

Don't forget to run sysctl -w net.ipv4.icmp_echo_ignore_all=1 on both machines (as root) so no interference may occur between the C2 and the implant.

Evasion techniques implemented so far:

  • Process masquerading
  • Encrypted traffic
  • Rudimentary environment variables wipe

Todo

  • Add some stealthiness (e.g default packet size with fragementation, delays...).
  • Use BPF to filter out packets instead (for better performance).

About

An ICMP-based reverse shell written in C

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published