From Foothold to Takeover: Mastering Pivoting Moves
1 min read
Summary
For those who are unfamiliar, Reju Kole is a bug hunter and athlete who spends their days discovering vulnerabilities in code and pushing the limits of their physical strength in the gym.
In terms of cybersecurity, pivoting is a technique used by attackers to broaden their access within a network once they have obtained a foothold.
One of the most useful tools for this process is Ligolo-ng, a strong, lightweight tunneling tool that facilitates reverse tunneling with high performance, security, reliability, and cross-platform compatibility.
For those who are new to the process, this guide gives a step-by-step tutorial on setting up Ligolo-ng, including getting the agent and proxy, setting up the reverse tunnel, adding a route to a new network, and setting up a double pivot.
It is hoped that this write-up will give users a solid grasp of the process and provide them with the knowledge to explore a hacked network and uncover any potential vulnerabilities.