Skip to content

Commit b2f40a1

Browse files
committed
new repo
0 parents  commit b2f40a1

22 files changed

+4538
-0
lines changed

.gitignore

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
venv
2+
build

README.md

+59
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
RPIVOT - reverse socks 4 proxy for penetration tests
2+
===================
3+
4+
5+
RPIVOT allows to tunnel traffic into internal network via socks 4. It works like ssh dynamic port forwarding but in the opposite direction.
6+
7+
8+
----------
9+
10+
11+
Description
12+
-------------
13+
14+
This tool is Python 2.6-2.7 compatible and has no dependencies beyond the standard library. It has client-server architecture. Just run the client on the machine you want to tunnel the traffic through. Server should be started on pentester's machine and listen to incoming connections from the client.
15+
16+
Works on Kali Linux, Solaris 10, Windows, Mac OS.
17+
18+
19+
Usage example
20+
-------------
21+
22+
Start server listener on port 9999, which creates a socks 4 proxy on 127.0.0.1:1080 upon connection from client:
23+
24+
`python server.py --server-port 9999 --server-ip 0.0.0.0 --proxy-ip 127.0.0.1 --proxy-port 1080`
25+
26+
Connect to the server:
27+
28+
`python client.py --server-ip <rpivot_server_ip> --server-port 9999`
29+
30+
To pivot through an NTLM proxy:
31+
32+
`python client.py --server-ip <rpivot_server_ip> --server-port 9999 --ntlm-proxy-ip <proxy_ip> --ntlm-proxy-port 8080 --domain CONTOSO.COM --username Alice --password P@ssw0rd`
33+
34+
Pass-the-hash is supported:
35+
36+
`python client.py --server-ip <rpivot_server_ip> --server-port 9999 --ntlm-proxy-ip <proxy_ip> --ntlm-proxy-port 8080 --domain CONTOSO.COM --username Alice --hashes 9b9850751be2515c8231e5189015bbe6:49ef7638d69a01f26d96ed673bf50c45`
37+
38+
You can use `proxychains` to tunnel traffic through socks proxy.
39+
40+
Edit /etc/proxychains.conf:
41+
42+
```
43+
[ProxyList]
44+
# add proxy here ...
45+
# meanwile
46+
# defaults set to "tor"
47+
socks4 127.0.0.1 1080
48+
```
49+
50+
Pivot and have fun:
51+
52+
`proxychains <tool_name>`
53+
54+
Pre-built Windows client binary available at the `dist` folder
55+
56+
Author
57+
------
58+
59+
Artem Kondratenko https://twitter.com/artkond

0 commit comments

Comments
 (0)