Johnermac
  • About me
  • Active Directory
    • PowerShell
      • Customize
      • Notes
      • ETW
      • AMSI Bypass
      • Obfuscation
    • Enumeration
      • Domain
      • GPO
      • ACL
      • Domain Trusts
      • Forest
      • Extra
      • BloodHound
      • BloodHound CE
  • Tunneling
    • Tools
      • Udp2Raw
      • Fraud Bridge
      • Chisel
      • SSF
      • Egress-Assess
      • Ligolo-ng
      • Sshutle
      • Rpivot
      • Tunna
      • reGeorg
      • Neo-reGeorg
      • PivotSuite
  • Post-Exploitation
    • Data Exfiltration
      • HTTP
        • Cancel
        • wget
        • bash
        • busybox
        • IRB
        • PHP
        • Ruby
      • ICMP
        • XXD
        • Ruby
        • Python
      • UDP
        • Netcat
      • TCP
        • Netcat
        • KSH
        • whois
        • Finger
      • HTTPS
        • Python
        • OpenSSL
  • BLOG
    • Articles
      • Pivoting for Red Teaming
Powered by GitBook
On this page
  1. Tunneling
  2. Tools

Fraud Bridge

ICMP and DNS tunneling via IPv4 and IPv6

PreviousUdp2RawNextChisel

Last updated 2 years ago

Source:

How to extract files

We can use when TCP/UDP are blocked by Firewall

https://github.com/stealth/fraud-bridge
Diagram of Usage
Generate a random hexadecimal key
Open the Tunneling in the Attacker machine
execute the inside.sh in the Attacker machine
In the Target machine
Execute outside.sh in the target machine
Now we can access
normal ssh access
Wireshark results
We can also use DNS instead of ICMP
second part of the tunneling via DNS
ssh connection
Wireshark results