EvilZone

Other => Found it on the Webs => Topic started by: 0E 800 on August 27, 2015, 06:36:21 PM

Title: VPN Pivot!
Post by: 0E 800 on August 27, 2015, 06:36:21 PM
Sharing.

Quote
Sometime we do external penetration testing and when we compromise the remote target we would love to explore the internal network behind and getting such compromise like owning Active directory, accessing shared files ... etc. There are many techniques like port forwarding, socks4 ..., but each one has its pros and cons . this is the reason why VPN pivoting techniques is out , it solves all the problems encountered by using both of the techniques mentioned above. it lets you interact with internal networks that are prevented by firewalls,NATs .. etc

This an implementation of VPN pivoting technique in Linux using pure low-level sockets within tap device. It creates a fully encrypted tunnel using a shared key between the target machine and the attacker.

https://github.com/0x36/VPNPivot
Title: Re: VPN Pivot!
Post by: ram1r3z0 on February 29, 2016, 08:38:41 PM
Do you know something like that for Windows environments ?
Windows client and server

Thank you