githubEdit

Network Pivoting Methodology

1) Internal Host Discovery

In a network, if you root a machine, do these checks:

Windows

Info about interfaces

ipconfig /all

Print available routes

route print

Known hosts on the routing table

arp -a

Opened ports/services/connections running on the machine

netstat -ano

DNS Entries

type C:\WINDOWS\System32\drivers\etc\hosts

And

ipconfig /displaydns | findstr "Record" | findstr "Name Host"

Ping Sweep Script (You might have to do some guesswork on the subnet we want to discover if we did not find any data)

Linux

Info about interfaces

Known hosts on the routing table

Opened ports/services/connections running on the machine

DNS Entries

Ping Sweep Script (You might have to do some guesswork on the subnet we want to discover if we did not find any data)

2) SOCKS Proxy setup

Create reverse proxies to route traffic inside the internal network.

Some tools you can use to do it

  1. SSH Dynamic Proxy (Authenticated)

  2. Chisel

Attacker machine

Victim rooted machine

3) sshuttle (Authenticated)

Use the IP machine as a jumpbox to connect to the specific TARGET_IP machine

Key based authentication

4) Metasploit

Route traffic

Port forwarding

Autoroute using meterpreter

Proxy setup

3) Run tools from your attacking machine to internal network

Run any tool you want via proxychains using your setup proxy.

Setup the apropriate type of proxy and port in the master config file of proxychains

If you want to use more proxies, just copy the master config file and change the appropriate values to the corresponding port number

Now you are ready to pivot within the internal network

Example

OR

Last updated