PingRAT - Secretly Passes C2 Traffic Through Firewalls Using ICMP Payloads

AVvXsEgICMX5BXgOKOSKO0ZJY2U_M_2NZe2iubWsyEDeMkfjGzhrSYPCXjX_kSxWc_9rTVa3kCIsgbJKaCr5H3XFc34Dx8rmsv2sZydsPNFRVA2heCMaBeQS4mI-eVcYFY6RkMFPpNJQdmw_hAsRkYg4XrlXZJTHdfo5Mi1Q3iCKFokBc-MxhbRfcVOdijeI1Il9=w640-h292

PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.

Features:​

  • Uses ICMP for Command and Control
  • Undetectable by most AV/EDR solutions
  • Written in Go

Installation:​

Download the binaries
or build the binaries and you are ready to go:
코드:
$ git clone https://github.com/Nemesis0U/PingRAT.git
$ go build client.go
$ go build server.go

Usage:​

Server:​

코드:
./server -h
Usage of ./server:
  -d string
        Destination IP address
  -i string
        Listener (virtual) Network Interface (e.g. eth0)

Client:​

코드:
./client -h
Usage of ./client:
  -d string
        Destination IP address
  -i string
        (Virtual) Network Interface (e.g., eth0)
 
뒤로
상단