Johnermac
  • About me
  • Active Directory
    • PowerShell
      • Customize
      • Notes
      • ETW
      • AMSI Bypass
      • Obfuscation
    • Enumeration
      • Domain
      • GPO
      • ACL
      • Domain Trusts
      • Forest
      • Extra
      • BloodHound
      • BloodHound CE
  • Tunneling
    • Tools
      • Udp2Raw
      • Fraud Bridge
      • Chisel
      • SSF
      • Egress-Assess
      • Ligolo-ng
      • Sshutle
      • Rpivot
      • Tunna
      • reGeorg
      • Neo-reGeorg
      • PivotSuite
  • Post-Exploitation
    • Data Exfiltration
      • HTTP
        • Cancel
        • wget
        • bash
        • busybox
        • IRB
        • PHP
        • Ruby
      • ICMP
        • XXD
        • Ruby
        • Python
      • UDP
        • Netcat
      • TCP
        • Netcat
        • KSH
        • whois
        • Finger
      • HTTPS
        • Python
        • OpenSSL
  • BLOG
    • Articles
      • Pivoting for Red Teaming
Powered by GitBook
On this page
  • Use cases & Scenarios
  • Case 1 - Forward
  • Case 2 - Reverse
  • Example: Reverse Dynamic Port Forwarding
  • Considerations
  1. Tunneling
  2. Tools

PivotSuite

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network.

PreviousNeo-reGeorgNextData Exfiltration

Last updated 2 years ago

Source:

Use cases & Scenarios

  1. We have direct access to the target machine

  2. The target machine is behind a firewall/NAT

Case 1 - Forward

We should execute PivotSuite server on the target:

  • Dynamic Port Forwarding - using Socks5

python pivotsuite.py -S -F --server-option SP --server-ip IP --server-port PORT
  • Single Port Forwarding - using TCP/UDP Relay

python pivotsuite.py -S -F --server-option PF --network-protocol T/U --remote-ip IP --remote-port PORT 
          --server-ip IP (local-ip) --server-port PORT (local-port)

Case 2 - Reverse

We should execute PivotSuite server on the Attacker machine:

python pivotsute.py -S -W

And execute the Client on the Target machine:

  • Dynamic Port Forwarding - socks

python pivotsuite.py -C -O SP --server-ip IP --server-port PORT
  • Local / Remote Port Forwarding

python pivotsuite.py -C -O PF  - L / -R (local or remote port forwarding) -P T/U  --local-ip IP 
              --local-port PORT --remote-ip IP --remote-port PORT  --server-ip IP --server-port PORT
  • Network Enumeration

python pivotsuite.py -C -O NE --server-ip IP --server-port PORT

Example: Reverse Dynamic Port Forwarding

Considerations

  • It opens the socks on 0.0.0.0

  • It generates a random port each time

  • The connection is not reliable

https://github.com/RedTeamOperations/PivotSuite
Open the server on Attacker
Connect the client to the server
Connected
We can access through proxychains
Wireshark Results