Tag: Port Forwarding

A Detailed Guide on Ligolo-Ng

This comprehensive guide delves into the intricacies of Lateral Movement utilizing Ligolo-Ng, a tool developed by Nicolas Chatelain. The Ligolo-Ng tool facilitates the establishment of tunnels through reverse TCP/TLS connections using a tun interface, avoiding the necessity of SOCKS. This guide covers various aspects, from the tool’s unique features to practical applications such as single […]

A Detailed Guide on Chisel

Chisel port forwarding is a powerful technique that penetration testers and red teamers commonly use to bypass firewalls and securely access internal services. This guide explores how to use Chisel for tunneling traffic and setting up remote connections through local port forwarding and SOCKS5 proxies in various real-world scenarios. Table of content Introduction to Chisel […]

Port Forwarding & Tunnelling Cheatsheet

In this article, we are going to learn about the concepts and techniques of Port forwarding and Tunnelling. This article stands as an absolute cheatsheet on the two concepts. Port forwarding transmits a communication request from one address and the port number while sending the packets in a network. Tunnelling has proven to be highly beneficial as […]

Command and Control & Tunnelling via ICMP

In this article, you will learn about the RED TEAM Operation for data exfiltration via ICMP-C2 and ICMP Tunneling because both approaches are useful in order to circumvent firewall rules because they generate unsound traffic in the network. Table of Content Brief Summary on the Working of the ICMP Protocol Command & Control via ICMP […]

Comprehensive Guide on SSH Tunneling

Basically, tunneling is a process that allows data sharing or communication between two different networks privately. Tunneling is normally performed by encapsulating the private network data and protocol information inside the public network broadcast units so that the private network protocol information is visible to the public network as data.  SSH Tunnel:  Tunneling is the concept to […]

VNC tunneling over SSH

In the previous article, we had performed VNC penetration testing and today you will VNC tunneling to connect the remote machine with VNC server when they both belong different network interface. Network Setup and Requirements for VNC Tunneling Basically, tunneling is a process that allows data sharing or communication between two different networks privately. Tunneling […]