Most of the perimeter security implementations allow outbound DNS and ICMP traffic in their firewalls. ICMP and DNS protocols can be leveraged by the attackers to leak data from the organization. Implement a simulation software that can be used for data leakage using ICMP and DNS tunneling. The software is required for the evaluation of firewall intelligence.
Notes: In order to demonstrate the approach, simulate a setup in which only ICMP and DNS traffic is allowed over Internet
Sample Data Required: No