![]() ![]() I found out you do not need to install shady third party, suck-assed third-party software to function as a proxy to your attacking Kali Linux VM on Windows machines.įor those that want to do wireless penetration tests on the LAN, and have the misfortune of not having a bare-metal Kali Linux machine on your work laptop, you may be stuck on the field with nothing more than a Windows 10 or 11 laptop with Kali Linux installed as a VMWare machine. After reading some blogger shitposts and Microsoft documentation… It is advisable to change your wireless adapter’s MAC address with a Powershell script prior to connecting to the engagement target’s hotspot. The reason is to avoid putting your VMWare Kali Linux VM into bridged mode, which would have another device on the LAN requesting a IP address, which may give away your position and risk detection as Kali Linux VMs can easily be detected as a Debian-derivative in nmap scans.įurthermore, it is easy to determine the type of OS on a LAN simply by pinging it LOCALLY, because the TTL for a Linux/Unix machine always as a Time-To-Live (TTL) of 64 and a Windows machine of 127/128. You want to run Kali Linux from the safety of a Hypervisor like VMWare Workstation and appearing on the network like a Windows device You do not have a Kali Linux boot disk or a bare metal install of Kali Linuxģ. You may have forgotten to bring your Linux laptop for your pentest before heading outĢ. We will repeat these steps using standard Windows command line tools as a administrator. I will try my best to hone my articles over time. I wrote this article in the assumption that you have some pentesting experience, even academic-level (like Virtual Hacking Labs, TryHackMe, HackTheBox, and Offensive Security Proving Grounds), and that you are familiar with tools such as Metasploit and the Windows command line. I am a very busy person as I teach three online classes, maintain multiple GitHub Code Repositories and regularly compete in CTFs. ![]() I apologize if I do not document my steps very well or write in a manner that requires a bit of technical understanding. If you are using a Ubuntu 20.04 host and want to redirect Meterpreter shells to your attacking Kali Linux Machine from the LAN it would be as simple as sudo socat -v TCP4-L:443,reuseaddr,fork tcp4:192.168.122.50:8443 This is a continuation of my previous WordPress Post on socat redirection proxies ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |