mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Update README.md
This commit is contained in:
parent
a991cd7af4
commit
9494ab8d2e
@ -1,19 +1,19 @@
|
||||
**Title: PingZhellBunny**
|
||||
|
||||
Author: 0iphor13
|
||||
<p>Author: 0iphor13<br>
|
||||
OS: Windows<br>
|
||||
Version: 1.5<br>
|
||||
|
||||
Version: 1.3
|
||||
|
||||
What is PingZhellBunny?
|
||||
**What is PingZhellBunny?**
|
||||
#
|
||||
*Imagine a scenario in which communication to and from the server is protected and filtered by a firewall and does not allow TCP shell communication to take place on any listening port (both reverse and bind TCP connection).*
|
||||
*But many environments allow ping requests to be sent and received. Ping requests work on the ICMP protocol.*
|
||||
*ICMP stands for Internet Control Message Protocol; it is used by network devices’ query and error messages. ICMP differs from the widely used TCP and UDP protocols because ICMP is not used for transferring data between network devices.*
|
||||
*When a device wants to test connectivity to another device, it uses the PING tool (ICMP communication) to send an ECHO REQUEST and waits for an ECHO RESPONSE.*
|
||||
*The client ICMP agent (Bunny.pl) listens for ICMP packets from a specific host and uses the data in the packet for command execution.*
|
||||
*The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (PingZhell.ps1) and sends it commands to execute.*
|
||||
*The client ICMP agent listens for ICMP packets from a specific host and uses the data in the packet for command execution.*
|
||||
*The server ICMP agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (PingZhellBunny input) and sends it commands to execute.*
|
||||
#
|
||||
There you go, a reverse shell.
|
||||
There you go, a reverse shell without the usage of ports.
|
||||
|
||||
**Instruction:**
|
||||
|
||||
@ -26,16 +26,16 @@ Install dependencies, if needed:
|
||||
Disable ICMP replies by the OS:
|
||||
`sysctl -w net.ipv4.icmp_echo_ignore_all=1`
|
||||
|
||||
Start Bunny.pl -> perl Bunny.pl
|
||||
#
|
||||
!!!Insert the IP of your attacking machine into PingZhell.ps1!!!
|
||||
#
|
||||
<p>Plug in Bashbunny with PingZhellBunny equipped.<br>
|
||||
Start the client -> `perl Bunny.pl`
|
||||
|
||||
<p>!!!Insert the IP of your attacking machine into the payload variable $IP!!!<br>
|
||||
|
||||
<p>Plug in your BashBunny.<br>
|
||||
Achieve reverse shell.<br>
|
||||
run away <3</p>
|
||||
|
||||
|
||||
Credit for code and ideas:
|
||||
- bdamele
|
||||
- samratashok
|
||||
- Nikhil Mittal
|
||||
- krabelize
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user