EvilZone

Other => Found it on the Webs => : 0E 800 August 27, 2015, 06:36:21 PM

: VPN Pivot!
: 0E 800 August 27, 2015, 06:36:21 PM
Sharing.

Sometime we do external penetration testing and when we compromise the remote target we would love to explore the internal network behind and getting such compromise like owning Active directory, accessing shared files ... etc. There are many techniques like port forwarding, socks4 ..., but each one has its pros and cons . this is the reason why VPN pivoting techniques is out , it solves all the problems encountered by using both of the techniques mentioned above. it lets you interact with internal networks that are prevented by firewalls,NATs .. etc

This an implementation of VPN pivoting technique in Linux using pure low-level sockets within tap device. It creates a fully encrypted tunnel using a shared key between the target machine and the attacker.

https://github.com/0x36/VPNPivot
: Re: VPN Pivot!
: ram1r3z0 February 29, 2016, 08:38:41 PM
Do you know something like that for Windows environments ?
Windows client and server

Thank you