Hackers Hide in ICMP Ping Requests ๐ต๏ธโโ๏ธ
Learn how attackers use ICMP ping requests to covertly hide data and establish reverse shell connections with this demonstration.

Hack the Clown
17.6K views โข Nov 3, 2025

About this video
Ping requests can be deadly.
In this video, I will show you how attackers hide data by demonstrating a tool that tunnels a reverse shell connection through ICMP traffic.
// Tags
#ethicalhacking #icmp #reverse-shell #covert-operations
// Chapters
0:00 - Intro
0:29 - ICMP reverse shell demo
1:43 - Understanding the mechanics
2:30 - Analyzing the scripts
5:25 - Looking under wireshark
// Links
* icmpdoor: https://github.com/krabelize/icmpdoor
In this video, I will show you how attackers hide data by demonstrating a tool that tunnels a reverse shell connection through ICMP traffic.
// Tags
#ethicalhacking #icmp #reverse-shell #covert-operations
// Chapters
0:00 - Intro
0:29 - ICMP reverse shell demo
1:43 - Understanding the mechanics
2:30 - Analyzing the scripts
5:25 - Looking under wireshark
// Links
* icmpdoor: https://github.com/krabelize/icmpdoor
Video Information
Views
17.6K
Likes
1.0K
Duration
6:03
Published
Nov 3, 2025
User Reviews
4.6
(3) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.