Update README.md

This commit is contained in:
0iphor13
2021-12-23 13:12:21 +01:00
committed by GitHub
parent 712ebe762c
commit c19b9e56f6

View File

@@ -1,17 +1,17 @@
**Title: pingUinBunny** **Title: PingZhellBunny**
Author: 0iphor13 Author: 0iphor13
Version: 1.0 Version: 1.0
What is pingUinBunny? What is PingZhellBunny?
# #
*Imagine a scenario in which communication to and from the server is protected and filtered by a firewall and does not allow TCP shell communication to take place on any listening port (both reverse and bind TCP connection).* *Imagine a scenario in which communication to and from the server is protected and filtered by a firewall and does not allow TCP shell communication to take place on any listening port (both reverse and bind TCP connection).*
*But many environments allow ping requests to be sent and received. Ping requests work on the ICMP protocol.* *But many environments allow ping requests to be sent and received. Ping requests work on the ICMP protocol.*
*ICMP stands for Internet Control Message Protocol; it is used by network devices query and error messages. ICMP differs from the widely used TCP and UDP protocols because ICMP is not used for transferring data between network devices.* *ICMP stands for Internet Control Message Protocol; it is used by network devices query and error messages. ICMP differs from the widely used TCP and UDP protocols because ICMP is not used for transferring data between network devices.*
*When a device wants to test connectivity to another device, it uses the PING tool (ICMP communication) to send an ECHO REQUEST and waits for an ECHO RESPONSE.* *When a device wants to test connectivity to another device, it uses the PING tool (ICMP communication) to send an ECHO REQUEST and waits for an ECHO RESPONSE.*
*The client ICMP agent (Bunny.pl) listens for ICMP packets from a specific host and uses the data in the packet for command execution.* *The client ICMP agent (Bunny.pl) listens for ICMP packets from a specific host and uses the data in the packet for command execution.*
*The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (Invoke-pingUin.ps1) and sends it commands to execute.* *The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (PingZhell.ps1) and sends it commands to execute.*
# #
There you go, a reverse shell. There you go, a reverse shell.
@@ -28,7 +28,7 @@ Disable ICMP replies by the OS:
Start Bunny.pl -> perl Bunny.pl Start Bunny.pl -> perl Bunny.pl
# #
Plug in Bashbunny with pingUinBunny equipped. Plug in Bashbunny with PingZhellBunny equipped.
Achieve reverse shell. Achieve reverse shell.
run away <3 run away <3