diff --git a/payloads/library/remote_access/pingUinBunny/README.md b/payloads/library/remote_access/pingUinBunny/README.md index df93b797..69164252 100644 --- a/payloads/library/remote_access/pingUinBunny/README.md +++ b/payloads/library/remote_access/pingUinBunny/README.md @@ -1,17 +1,17 @@ -**Title: pingUinBunny** +**Title: PingZhellBunny** Author: 0iphor13 Version: 1.0 -What is pingUinBunny? +What is PingZhellBunny? # *Imagine a scenario in which communication to and from the server is protected and filtered by a firewall and does not allow TCP shell communication to take place on any listening port (both reverse and bind TCP connection).* *But many environments allow ping requests to be sent and received. Ping requests work on the ICMP protocol.* *ICMP stands for Internet Control Message Protocol; it is used by network devices’ query and error messages. ICMP differs from the widely used TCP and UDP protocols because ICMP is not used for transferring data between network devices.* *When a device wants to test connectivity to another device, it uses the PING tool (ICMP communication) to send an ECHO REQUEST and waits for an ECHO RESPONSE.* *The client ICMP agent (Bunny.pl) listens for ICMP packets from a specific host and uses the data in the packet for command execution.* -*The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (Invoke-pingUin.ps1) and sends it commands to execute.* +*The server ICMP Agent (Bunny.pl) sends ICMP packets to connect to the victim running a custom ICMP agent (PingZhell.ps1) and sends it commands to execute.* # There you go, a reverse shell. @@ -28,7 +28,7 @@ Disable ICMP replies by the OS: Start Bunny.pl -> perl Bunny.pl # -Plug in Bashbunny with pingUinBunny equipped. +Plug in Bashbunny with PingZhellBunny equipped. Achieve reverse shell. run away <3