Pivot Through Multiple Networks | Master Network Pivoting

Поделиться
HTML-код
  • Опубликовано: 29 окт 2024

Комментарии • 16

  • @Siik94Skillz
    @Siik94Skillz 6 месяцев назад

    I believe this is EXACTLY what i needed for Dante on HTB

    • @NetsecExplained
      @NetsecExplained  6 месяцев назад

      Tell your friends!

    • @Siik94Skillz
      @Siik94Skillz 6 месяцев назад

      @NetsecExplained turns out it wasn't but still a great video! 👌🏾

  • @13jarni
    @13jarni Год назад +1

    Nice video :)
    Just for a reference, the xfree rdp client supports socks proxy. You can either use proxy chains or specify the proxy host as a parameter.

    • @NetsecExplained
      @NetsecExplained  Год назад

      You're right, I just wanted an excuse to show off how you can pivot using local port forwarding.

  • @TronixBeats
    @TronixBeats 9 месяцев назад

    Hi nice video iam new in pentesting and your video helped me to understand the theory behind pivoting :) got a question for you terminal. looks like you are using somethibg else than the Standart in kali. What are you using?

    • @NetsecExplained
      @NetsecExplained  9 месяцев назад

      I'm using ZSH with OhMyZSH extension. I like it, it's pretty.

  • @PwCTest-m4b
    @PwCTest-m4b 9 месяцев назад +1

    Hey bro, nice one. Could you please help me out for pivoting in a scenario where:
    Kali machine RDP to-> Windows server (192.168.1.x)-> Same network Windows jump server (192.168.1.x) -> SqLi Limited shell windows server(192.168.2.x) -> lateral movement windows server (192.168.2.x) Also gateway to 192.168.3.x
    Need to route traffic to 192.168.3.x

    • @NetsecExplained
      @NetsecExplained  9 месяцев назад

      This one's tricky because of so many hops. If you can, I'd probably use a reverse tunnel at some point so you don't have to go through so many hops. But if you have to, then I'd use something like Proxychains or meterpreter routes if you can. People have brought up Chisel before, but it works very similar to SSH so you'd have the same issues with that alone. Hope this helps.

  • @Nucifero1
    @Nucifero1 Год назад

    So did you create the Ubuntu jump post at an earlier time? Thank you for creating this video! Cheers

    • @NetsecExplained
      @NetsecExplained  Год назад

      Yes, correct. This is a common scenario you'll see in red teaming. You load a dropper on the network and that's your access point. Once you have that in the environment, this video covers how to tunnel through it.

  • @migueloliveira333
    @migueloliveira333 Год назад

    Hi. Is it possible to run responder with proxy chains? Without being sudo on the target machine? Thanks for the content

    • @NetsecExplained
      @NetsecExplained  Год назад

      Good question!
      Unfortunately no. Responder responds to multicast traffic, which does not make it through the SOCKS4 proxy. Think of it as only point-to-point traffic can go through the proxy. That's why Nmap needed the -sT flag for a full connection scan. Otherwise, it doesn't work properly either.

  • @phillydee3592
    @phillydee3592 9 месяцев назад

    Could you have RDP to the windows system with xfreerdp as well??Great vid!!

  • @mohadioum3314
    @mohadioum3314 Год назад

    Nice demo and helpful 🫂