mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Update README.md
This commit is contained in:
@@ -1,17 +1,17 @@
|
|||||||
**Title: pingUinBunny**
|
**Title: PingZhellBunny**
|
||||||
|
|
||||||
Author: 0iphor13
|
Author: 0iphor13
|
||||||
|
|
||||||
Version: 1.0
|
Version: 1.0
|
||||||
|
|
||||||
What is pingUinBunny?
|
What is PingZhellBunny?
|
||||||
#
|
#
|
||||||
*Imagine a scenario in which communication to and from the server is protected and filtered by a firewall and does not allow TCP shell communication to take place on any listening port (both reverse and bind TCP connection).*
|
*Imagine a scenario in which communication to and from the server is protected and filtered by a firewall and does not allow TCP shell communication to take place on any listening port (both reverse and bind TCP connection).*
|
||||||
*But many environments allow ping requests to be sent and received. Ping requests work on the ICMP protocol.*
|
*But many environments allow ping requests to be sent and received. Ping requests work on the ICMP protocol.*
|
||||||
*ICMP stands for Internet Control Message Protocol; it is used by network devices’ query and error messages. ICMP differs from the widely used TCP and UDP protocols because ICMP is not used for transferring data between network devices.*
|
*ICMP stands for Internet Control Message Protocol; it is used by network devices’ query and error messages. ICMP differs from the widely used TCP and UDP protocols because ICMP is not used for transferring data between network devices.*
|
||||||
*When a device wants to test connectivity to another device, it uses the PING tool (ICMP communication) to send an ECHO REQUEST and waits for an ECHO RESPONSE.*
|
*When a device wants to test connectivity to another device, it uses the PING tool (ICMP communication) to send an ECHO REQUEST and waits for an ECHO RESPONSE.*
|
||||||
*The client ICMP agent (Bunny.pl) listens for ICMP packets from a specific host and uses the data in the packet for command execution.*
|
*The client ICMP agent (Bunny.pl) listens for ICMP packets from a specific host and uses the data in the packet for command execution.*
|
||||||
*The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (Invoke-pingUin.ps1) and sends it commands to execute.*
|
*The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (PingZhell.ps1) and sends it commands to execute.*
|
||||||
#
|
#
|
||||||
There you go, a reverse shell.
|
There you go, a reverse shell.
|
||||||
|
|
||||||
@@ -28,7 +28,7 @@ Disable ICMP replies by the OS:
|
|||||||
|
|
||||||
Start Bunny.pl -> perl Bunny.pl
|
Start Bunny.pl -> perl Bunny.pl
|
||||||
#
|
#
|
||||||
Plug in Bashbunny with pingUinBunny equipped.
|
Plug in Bashbunny with PingZhellBunny equipped.
|
||||||
Achieve reverse shell.
|
Achieve reverse shell.
|
||||||
run away <3
|
run away <3
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user