Skip to content

Latest commit

 

History

History
18 lines (14 loc) · 873 Bytes

README.md

File metadata and controls

18 lines (14 loc) · 873 Bytes

Description

An ICMP-based reverse shell written in C, nothing fancy, made it just for fun and to poke at some C/*nix programming concepts.

Usage

You can build the binaries by running make which needs sudo permissions to set the cap_net_raw capability:

  • bin/icmp-c2 is the C2 that sends commands to the implant (attacker)
  • bin/icmp-implant is the implant which executes commands and sends them back to the C2 (victim)

Don't forget to run sysctl -w net.ipv4.icmp_echo_ignore_all=1 on both machines (as root) so no interference may occur between the C2 and the implant.

Evasion techniques implemented so far:

  • Process masquerading
  • Encrypted traffic
  • Rudimentary environment variables wipe

Todo

  • Add some stealthiness (e.g default packet size with fragementation, delays...).
  • Use BPF to filter out packets instead (for better performance).