This comprehensive guide delves into the intricacies of Lateral Movement utilizing Ligolo-Ng, a tool developed by Nicolas Chatelain. The Ligolo-Ng tool facilitates the establishment of tunnels through reverse TCP/TLS connections using a tun interface, avoiding the necessity of SOCKS. This guide covers various aspects, from the tool’s unique features to practical applications such as single […]
A Detailed Guide on Chisel
Chisel port forwarding is a powerful technique that penetration testers and red teamers commonly use to bypass firewalls and securely access internal services. This guide explores how to use Chisel for tunneling traffic and setting up remote connections through local port forwarding and SOCKS5 proxies in various real-world scenarios. Table of content Introduction to Chisel […]
Port Forwarding & Tunnelling Cheatsheet
In this article, we are going to learn about the concepts and techniques of Port forwarding and Tunnelling. This article stands as an absolute cheatsheet on the two concepts. Port forwarding transmits a communication request from one address and the port number while sending the packets in a network. Tunnelling has proven to be highly beneficial as […]
Command and Control & Tunnelling via ICMP
In this article, you will learn about the RED TEAM Operation for data exfiltration via ICMP-C2 and ICMP Tunneling because both approaches are useful in order to circumvent firewall rules because they generate unsound traffic in the network. Table of Content Brief Summary on the Working of the ICMP Protocol Command & Control via ICMP […]
Comprehensive Guide on SSH Tunneling
Basically, tunneling is a process that allows data sharing or communication between two different networks privately. Tunneling is normally performed by encapsulating the private network data and protocol information inside the public network broadcast units so that the private network protocol information is visible to the public network as data. SSH Tunnel: Tunneling is the concept to […]
VNC Pivoting through Meterpreter
In the previous article we had described VNC penetration testing and VNC tunneling through SSH but today we are going to demonstrate VNC pivoting. From Offensive Security Pivoting is a technique to get inside an unreachable network with help of pivot (center point). In simple words, it is an attack through which an attacker can exploit […]
VNC tunneling over SSH
In the previous article, we had performed VNC penetration testing and today you will VNC tunneling to connect the remote machine with VNC server when they both belong different network interface. Network Setup and Requirements for VNC Tunneling Basically, tunneling is a process that allows data sharing or communication between two different networks privately. Tunneling […]
SSH Pivoting using Meterpreter
If you are aware of SSH tunneling then you can easily understand SSH pivoting, if not then don’t worry read SSH tunneling from here. Establishing Initial Access via SSH Login Pivoting is a technique to get inside an unreachable network with the help of a pivot (center point). In simple words, it is an attack […]