πŸ”€Pivoting

Refer this for more techniques

Use my script from script Proxify.sh from here

Ligolo-ng

  • Attacker:

sudo ip tuntap add user kali mode tun ligolo
sudo ip link set ligolo up
sudo ip route add 172.16.201.0/24 dev ligolo
sudo ligolo-proxy -selfcert

Add the targets ip range as seen in ifconfig in ligolo

For this add 172.16.201.0/24
  • Target:

To redirect:

  • Creates a listener on the machine where we're running the agent at port 1234

  • and redirects the traffic to port 4444 on our machine.

  • You can use other ports, of course.

Reverse shell:

Example for the listener above:

For file transfer:

Create another listener

Now transfer files by using the ip of the machine that was tunneled from earlier and use port 1234. Create a python server on port 8000 in kali.

Chisel

  • Attacker:

  • Target:

Then add to /etc/proxychains5.conf

To forward a single port from target to our machine:

SSH Port Forwarding

Multiple ports can be forwarded

Can be scanned like so :

SSH pivoting

Sshuttle

Last updated

Was this helpful?