From 9494ab8d2e3b922fe31e1e1f21633ea3a1a31588 Mon Sep 17 00:00:00 2001 From: 0iphor13 <79219148+0iphor13@users.noreply.github.com> Date: Wed, 19 Oct 2022 18:29:26 +0200 Subject: [PATCH] Update README.md --- .../remote_access/PingZhellBunny/README.md | 26 +++++++++---------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/payloads/library/remote_access/PingZhellBunny/README.md b/payloads/library/remote_access/PingZhellBunny/README.md index ac8ccd9f..d2f9309e 100644 --- a/payloads/library/remote_access/PingZhellBunny/README.md +++ b/payloads/library/remote_access/PingZhellBunny/README.md @@ -1,19 +1,19 @@ **Title: PingZhellBunny** -Author: 0iphor13 +

Author: 0iphor13
+OS: Windows
+Version: 1.5
-Version: 1.3 - -What is PingZhellBunny? +**What is PingZhellBunny?** # *Imagine a scenario in which communication to and from the server is protected and filtered by a firewall and does not allow TCP shell communication to take place on any listening port (both reverse and bind TCP connection).* *But many environments allow ping requests to be sent and received. Ping requests work on the ICMP protocol.* *ICMP stands for Internet Control Message Protocol; it is used by network devices’ query and error messages. ICMP differs from the widely used TCP and UDP protocols because ICMP is not used for transferring data between network devices.* *When a device wants to test connectivity to another device, it uses the PING tool (ICMP communication) to send an ECHO REQUEST and waits for an ECHO RESPONSE.* -*The client ICMP agent (Bunny.pl) listens for ICMP packets from a specific host and uses the data in the packet for command execution.* -*The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (PingZhell.ps1) and sends it commands to execute.* +*The client ICMP agent listens for ICMP packets from a specific host and uses the data in the packet for command execution.* +*The server ICMP agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (PingZhellBunny input) and sends it commands to execute.* # -There you go, a reverse shell. +There you go, a reverse shell without the usage of ports. **Instruction:** @@ -26,16 +26,16 @@ Install dependencies, if needed: Disable ICMP replies by the OS: `sysctl -w net.ipv4.icmp_echo_ignore_all=1` -Start Bunny.pl -> perl Bunny.pl -# -!!!Insert the IP of your attacking machine into PingZhell.ps1!!! -# -

Plug in Bashbunny with PingZhellBunny equipped.
+Start the client -> `perl Bunny.pl` + +

!!!Insert the IP of your attacking machine into the payload variable $IP!!!
+ +

Plug in your BashBunny.
Achieve reverse shell.
run away <3

Credit for code and ideas: - bdamele -- samratashok +- Nikhil Mittal - krabelize