Fraud Bridge

ICMP and DNS tunneling via IPv4 and IPv6

Source: https://github.com/stealth/fraud-bridge

How to extract files

We can use when TCP/UDP are blocked by Firewall

Diagram of Usage
Generate a random hexadecimal key
Open the Tunneling in the Attacker machine
execute the inside.sh in the Attacker machine
In the Target machine
Execute outside.sh in the target machine
Now we can access
normal ssh access
Wireshark results
We can also use DNS instead of ICMP
second part of the tunneling via DNS
ssh connection
Wireshark results

Last updated