This PowerShell reverse shell uses ICMP (Internet Control Message Protocol, aka ping) over IPv4, going via the network layer, and does not need to use port listeners or complex routing.
Data is embedded in ICMP traffic to create a tool that can test detection and response measures such as NDR and XDR solutions.
It is important to note that this is intended for educational purposes and ethical penetration testing and red teaming, where permissions to do so have been explicitly granted.
Practices like these highlight the importance of monitoring traffic at the network layer and maintaining updated cyber security measures to mitigate any exploits.
For more insights, you can read the member-only story here.