🔀Pivoting
Refer this for more techniques
Use my script from script Proxify.sh from here
Ligolo-ng
Attacker:
Add the targets ip range as seen in ifconfig
in ligolo
Target:
To redirect:
Creates a listener on the machine where we're running the agent at port 1234
and redirects the traffic to port 4444 on our machine.
You can use other ports, of course.
Reverse shell:
Example for the listener above:
For file transfer:
Create another listener
Now transfer files by using the ip of the machine that was tunneled from earlier and use port 1234. Create a python server on port 8000 in kali.
Chisel
Attacker:
Target:
Then add to /etc/proxychains5.conf
To forward a single port from target to our machine:
SSH Port Forwarding
Multiple ports can be forwarded
Can be scanned like so :
SSH pivoting
Sshuttle
Last updated