How To: C2 Over ICMP
Summary
This article details how to establish Command and Control (C2) communication over ICMP (Internet Control Message Protocol). It provides a practical guide for implementing this technique, likely for penetration testing or security research purposes.
IFF Assessment
FOE
This article describes a technique that can be used by adversaries to establish C2 channels, which is detrimental to defenders.
Defender Context
Understanding C2 over ICMP is crucial for defenders as it represents a covert communication channel that might evade traditional network security monitoring. Defenders should be aware of unusual ICMP traffic patterns and consider implementing stricter ICMP filtering rules or advanced detection mechanisms.