Offensive Security Tool: PingRAT

by | Jun 7, 2024 | Tools

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon

Reading Time: 2 Minutes

PingRAT

PingRAT by umutcamliyurt, is a tool designed to covertly transmit Command and Control (C2) traffic through firewalls by using ICMP (Internet Control Message Protocol) payloads. It hides its C2 communication within the data portion of ICMP packets. Since ICMP packets are typically allowed through firewalls and often overlooked by security systems, this method allows PingRAT to bypass firewall restrictions and evade detection. It can help penetration testers during security assessments, by simulate sophisticated attack techniques and evaluate the effectiveness of security defenses.

See Also: A Practical Guide to Hacking Techniques for finding Top Bugs.
The Bug Bounty Hunting Course

Features

  • Uses ICMP for Command and Control
  • Undetectable by most AV/EDR solutions
  • Written in Go

Installation:

Download the binaries

or build the binaries and you are ready to go:

$ git clone https://github.com/Nemesis0U/PingRAT.git

$ go build client.go

$ go build server.go

 

Usage:

Server:

./server -h
Usage of ./server:
  -d string
    	Destination IP address
  -i string
    	Listener (virtual) Network Interface (e.g. eth0)

 

Client:

./client -h
Usage of ./client:
  -d string
    	Destination IP address
  -i string
    	(Virtual) Network Interface (e.g., eth0)

Screenshot

 

Clone the repo from here: GitHub Link

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This