Johnermac
  • About me
  • Active Directory
    • PowerShell
      • Customize
      • Notes
      • ETW
      • AMSI Bypass
      • Obfuscation
    • Enumeration
      • Domain
      • GPO
      • ACL
      • Domain Trusts
      • Forest
      • Extra
      • BloodHound
      • BloodHound CE
  • Tunneling
    • Tools
      • Udp2Raw
      • Fraud Bridge
      • Chisel
      • SSF
      • Egress-Assess
      • Ligolo-ng
      • Sshutle
      • Rpivot
      • Tunna
      • reGeorg
      • Neo-reGeorg
      • PivotSuite
  • Post-Exploitation
    • Data Exfiltration
      • HTTP
        • Cancel
        • wget
        • bash
        • busybox
        • IRB
        • PHP
        • Ruby
      • ICMP
        • XXD
        • Ruby
        • Python
      • UDP
        • Netcat
      • TCP
        • Netcat
        • KSH
        • whois
        • Finger
      • HTTPS
        • Python
        • OpenSSL
  • BLOG
    • Articles
      • Pivoting for Red Teaming
Powered by GitBook
On this page
  • Set up the network
  • Pivoting
  1. Tunneling
  2. Tools

Ligolo-ng

Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS).

PreviousEgress-AssessNextSshutle

Last updated 2 years ago

Source:

Set up the network

$ sudo ip tuntap add user [your_username] mode tun ligolo 
$ sudo ip link set ligolo up

Pivoting

My environment:

  • Kali = C2 Server

  • Debian = target

  • Windows = Agent

  • Kali (c2) doesn't communicate with the Target

  • Here we can access the Session + number

  • Type help to view all commands

  • We can add a Listener to grab to Move Laterally

  • But in this case, we just wanna look at the network with ifconfig

  • We've "found" a new network

  • We can add it in the Kali/C2

  • In my target machine, I opened a web server in the 3rd machine (Isolated) just for demonstration

https://github.com/nicocha30/ligolo-ng
set this on Kali/C2 Server
Diagram of my Network
Open the Server
Connect the Agent to the Server
ifconfig in the session
Vmware interface
Add the route
Web server in the 3rd machine (Isolated)
Start the tunneling on the Session of the Kali/C2
Nmap the Target
Curl the webserver