O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Protocol spoofing using pingtunnel

In this recipe we will use pingtunnel to tunnel communications between two hosts. As most of the time, ICMP communications are allowed through firewalls and rarely inspected for malicious traffic by most companies, it makes it easy to set up a connection that will largely go unnoticed.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required