<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ligolo on LEIKAH</title><link>https://leikah.haoyingcao.xyz/en/tags/ligolo/</link><description>Recent content in Ligolo on LEIKAH</description><generator>Hugo</generator><language>en</language><atom:link href="https://leikah.haoyingcao.xyz/en/tags/ligolo/index.xml" rel="self" type="application/rss+xml"/><item><title>Pivoting with Ligolo-NG</title><link>https://leikah.haoyingcao.xyz/en/docs/tunneling/ligolo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/tunneling/ligolo/</guid><description>&lt;p&gt;&lt;a href="https://github.com/nicocha30/ligolo-ng"&gt;Ligolo-NG&lt;/a&gt; is an advanced yet simple to use offensive security tunneling tool. It make use of a TUN network interface to route traffic to the target internal network, which effectively allow us to interact with the network as if we have a VPN connection.&lt;/p&gt;
&lt;p&gt;Ligolo-NG is a preferred tool for the exam for OSCP or CPTS, as well as working on any labs that involve internal network pivoting.&lt;/p&gt;
&lt;h2 id="creating-tunnel"&gt;Creating Tunnel&lt;a class="td-heading-self-link" href="#creating-tunnel" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Suppose we have a pivot machine that shares the same network with the attacker machine (&lt;strong&gt;192.168.1.0/24&lt;/strong&gt;) and is connected to an internal network (&lt;strong&gt;10.10.0.0/24&lt;/strong&gt;) that is not accessible to the attacker machine. We may transfer the Ligolo agent to the pivot machine so that Ligolo can use that machine to forward traffic into the internal network.&lt;/p&gt;</description></item></channel></rss>