Hackers Hide in ICMP Ping Requests ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Learn how attackers use ICMP ping requests to covertly hide data and establish reverse shell connections with this demonstration.

Hackers Hide in ICMP Ping Requests ๐Ÿ•ต๏ธโ€โ™‚๏ธ
Hack the Clown
17.6K views โ€ข Nov 3, 2025
Hackers Hide in ICMP Ping Requests ๐Ÿ•ต๏ธโ€โ™‚๏ธ

About this video

Ping requests can be deadly.

In this video, I will show you how attackers hide data by demonstrating a tool that tunnels a reverse shell connection through ICMP traffic.

// Tags

#ethicalhacking #icmp #reverse-shell #covert-operations

// Chapters

0:00 - Intro
0:29 - ICMP reverse shell demo
1:43 - Understanding the mechanics
2:30 - Analyzing the scripts
5:25 - Looking under wireshark

// Links

* icmpdoor: https://github.com/krabelize/icmpdoor

Video Information

Views

17.6K

Likes

1.0K

Duration

6:03

Published

Nov 3, 2025

User Reviews

4.6
(3)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.