Summary

  • For those who are unfamiliar, Reju Kole is a bug hunter and athlete who spends their days discovering vulnerabilities in code and pushing the limits of their physical strength in the gym.
  • In terms of cybersecurity, pivoting is a technique used by attackers to broaden their access within a network once they have obtained a foothold.
  • One of the most useful tools for this process is Ligolo-ng, a strong, lightweight tunneling tool that facilitates reverse tunneling with high performance, security, reliability, and cross-platform compatibility.
  • For those who are new to the process, this guide gives a step-by-step tutorial on setting up Ligolo-ng, including getting the agent and proxy, setting up the reverse tunnel, adding a route to a new network, and setting up a double pivot.
  • It is hoped that this write-up will give users a solid grasp of the process and provide them with the knowledge to explore a hacked network and uncover any potential vulnerabilities.

By Reju Kole

Original Article