Author Topic: VPN Pivot!  (Read 1836 times)

0 Members and 1 Guest are viewing this topic.

Offline 0E 800

  • Not a VIP
  • VIP
  • Baron
  • *
  • Posts: 895
  • Cookies: 131
  • • тнε ιηтεяηεт ιs мү яεcүcℓε-вιη •
    • View Profile
VPN Pivot!
« on: August 27, 2015, 06:36:21 pm »
Sharing.

Quote
Sometime we do external penetration testing and when we compromise the remote target we would love to explore the internal network behind and getting such compromise like owning Active directory, accessing shared files ... etc. There are many techniques like port forwarding, socks4 ..., but each one has its pros and cons . this is the reason why VPN pivoting techniques is out , it solves all the problems encountered by using both of the techniques mentioned above. it lets you interact with internal networks that are prevented by firewalls,NATs .. etc

This an implementation of VPN pivoting technique in Linux using pure low-level sockets within tap device. It creates a fully encrypted tunnel using a shared key between the target machine and the attacker.

https://github.com/0x36/VPNPivot
The invariable mark of wisdom is to see the miraculous in the common.

Offline ram1r3z0

  • Serf
  • *
  • Posts: 29
  • Cookies: 2
    • View Profile
Re: VPN Pivot!
« Reply #1 on: February 29, 2016, 08:38:41 pm »
Do you know something like that for Windows environments ?
Windows client and server

Thank you