Hello, everybody. Welcome to the episode number 25 off the A Z speakers, lateral and vertical movement. My name is Muhammad Regina, and I'll begin structure for today's session.
The learning operatives of this session is to understand it, hot the concepts behind this technique and apply some concepts to implement this technique. So let's get down to business. Shall we
remember that in the previous video for tunneling, we saw how to create, you know, dynamic sshh tunnels so we can mimic a proxy sucks five blocks it, um, let's say that you have a machine and you want to move to another machine either in the same network segment,
kind of a lateral move movement or something hidden in another Internet or a billon. Maybe that can actually be reached on Lee from they already compromised machine. But not from your attacking machine, maybe, or from any machine from the Internet.
Said you just want to jump to that Internet or to that other machine. Maybe, Ah,
a morgue. You see server, for example, a database, for example. I don't know.
So we can start by enabling RS h Donald, Let me just, uh here is Shelby decision aerial use or with those 10 machine as the victim that we already compromised. We really have the password. And, you know, we already have the credentials and everything. And, well, to know Oliver traffic through that machine
so he actually reach the altar machine that we cannot actually
rich from. I enable some fire will rules on my windows expedition That will only allow traffic coming from the i p ending with seven. But not, you know, any other appeal, like the one in Cali, which is ending with eight.
So let me just start by great in the tunnel again. If you miss the previous video, you have todo definitely have to go watch it again. So we could you know, these. So this get makes some sense. So dynamic tunnel,
then just enter the battery here, and I have my tunnel. Did you remember? We had proof that,
um but the timing was grating. 81 81. Remember that
gallant. Just go, like in here.
Uh, let me just showed you that I will let me just modify real quick
the Brexit change configuration file
so we can know it's dynamic. You know, if you mean something on? It's already modified, Okay. And just want to use the *** fight proxy. So let me just show you here
example Port once tree nine and four for five for the S and P protocol.
And, you know, it seems that that that that is not up mean
it seems down. So let me just go through my tunnel right now. Proxy chains, which again will read your redirect all the traffic through this tunnel. And again, the Windows XB machine will actually accept traffic from from
or Windows 10 machine, which is again this this this machine. That's why we created a tunnel in that. So today, attacking to the victim's machine, it appeared that all the traffic will come from from from a trusted source, in this case, the Windows 10 machine. But you know, as again we're
going to tunnel Allah for traffic. All for you.
Poor scanning through that. And again. Don't panic if this doesn't yield. Ah,
accurate results. Remember, we're going to to, um,
another tunnel number application, so that might be a problem, but, you know, let's give it a shot
and just exact same command as before,
Just to see if we can actually get some results now.
Okay, Connected to the proxy. And it's just kind and scanning this cake could take a while. Remember, this is going through a tunnel, and there you go. He'd actually replied in it actually tells that
the these two boards are open. Okay, So that that's a huge advantage for us. So we can actually, you know, get some knowledge. And, you know, maybe this wasn't It was it was blocking traffic. Let me just give you real quick
that they'd come on there. We execute before, which is just basically this one is not actually replying to that. So
if I go to Brooks, it changed again, and I got a pass through the proxy, which is actually creating that
again. You will take a while, but I tell us accurate results that it's actually opened. So this is the magic and beauty about a lot of lot of vertical movement you can actually perform,
um, again. You can see the board's let's start off MSF counsel to this proxy chain. How about that?
And he will start our MSF consul through this proxy chains
again, it will not connected the data. Basically, Squid next starring you. Are that our proxy chains? I'm sorry. Off Amazon Council. True that proxy chains. So you will not find or local hose database that will be using, You know, that is that's that's used by the MSF counsel.
now that we're inside hopes or about that
or himself, Consul, through the proxy chains, we can actually, um,
use, for example, that remember that this machine is actually vulnerable to this module of this exploit, which is Ah, the eternal Blue
exploits. So show options.
And what do you think we need? Thio? Well, that's just said exploit here. Uh,
so we can have a river shell
said payload. I'm starting to explode with Pei. Liu
said payload. Okay. Show options?
What options do you think we cut to enter here?
Well, let's start by, you know, entering or normal options. Because at the end, all of this is going to the proxy change. So said our host and the one
his Windows experience set.
my colleague machine
and boom. We have an exploit.
OK, that's super cool. Let me just killed kill all of this
and just started normal immersive counsel so we can see that we can actually see the difference in this if we actually start that,
uh, let me just copy. Pays here, there
the module's exploiter we want to use
used this one. Remember? This is the Amazon council version without the proxy chains.
this copy days again
and show options. Said our host.
Now listen, the Hope Centauri
He would try to execute. Remember, guys, you're using the exact same
payload, exact same module in the MSF counsel, but you know, it will not work. Connects the connection timed out. It means that he's not actually replying to any off approves or in this case that exploit itself. So
let me just exiting here and told you that. So this is how you can achieve lateral and vertical movement, right? Leveraging this capabilities on, you know, the tor network, or, you know, in this case, specifically
the tunnels that you can create with the s H server client capabilities.
Uh, Jeff, there's that.
That's how you can pivot with dynamic poor foreboding. But you could do the same with local poor forward and maybe a little bit more manual, But it can also work. Maybe, for whatever reason, I'm just trying to give you all the tools that I can think of. Okay? For whatever reason, you cannot actually, uh,
all all all of this traffic or you can actually you cannot actually rich all of this traffic. So let me just put it
this command in year and just give you a glimpse of it. Okay? Thesis for local port.
local tunneling. Um, the poor that will be axing 81 81. Ah, I p of the victim. That cannot actually directly this case. This one. Um,
but, uh, you know, both over local or Mo port. You know, in this case for this one, it's me. It means that whenever access this on my local machines, it will go through this.
Okay? All the traffic Daigo here, my local machine. It will go to this and you know, for creating or tunnel. That's it. we just run it,
okay? Created or eternal successfully. Okay, I have another tongue. Sorry about that. Let me just exit. Discuss on it was created correctly.
That the end, I was using the same port.
and with that, we can again I start our final, but this time without the proxy chimps, just as with it in the first example. Remember, eh? So far, we have since two examples with the Amazon Council, which is basically what we also em up example as well. But with the advice of counsel,
we saw two examples. One
Ford. When using proxy chains directly, we call in the Amazon Council, and the other one was calling himself concert without any proxy chains, and it was obviously failing. Is that the end? We're blocked. Oh, are Carly machines is not allowed to to interact with the victim's machine, which is again
our Windows XB machine.
So again, let me start the MSF council again without, um,
that the proxy chains capability.
And why do you think? Is that what do you think this time will actually work? I will give you some time to think about it.
Um, but images that exact same exploit
Okay. Show options. I will not change the payload. It doesn't matter. But this time I will set the remote host.
And directly to our windows at Speed machine.
I'll give you one moment to think about it. No, it's not correct. Remember that we actually created a tunnel in here that is telling us that whatever I go to my local machine
to port anyone, anyone. It will tunnel all the traffic through this machine to go to this machine in this sport. I said that because it sounds a little bit confusing, but that's it. It that what it is whenever I go to ah ah, local host on port 81 81
it will turn out all the traffic. True, this machine
and it will go to this big tin machine. So this victim machine will think that a traffic is actually coming from this epic. So I will change the remote host to guess what
and well said they're remote.
Remember that, right?
Okay, is actually working so But the problem will be that, um Remember, this is not a Windows machine. So this we should fail at the first time. Um,
because, you know, this is for a Windows machine. So it's actually working, and no session was created. What? They're things that because at the end, the payload will be actually trying to get back to the Windows XB machine because that that's the one that is thinking that the pinging and all the payload is coming from
so that you will not get a reversal that was expected. Ah,
but for this case, we can also use a bind shell. So limit set a payload.
Remember? That's the beauty about reverse and buying shells they give us just copied out in here. I'm too lazy to actually type it,
and we can tell it Thio, go back to a specific machine. In this case, it automatically set up there or local host. But we obviously don't want to do that.
So, what do you think? We can actually put in that?
I will give you a month *** about it. Let me just running a city's just deceive, actually. Well, actually, work
uh, remote host. Okay, we'll go with that.
It will not work, obviously, because at the end, this is our local I p. So show options again set our host
show options and injustice to You can see that
Hopes I really messed up the pay. Look, I'm sorry. It was because
let me just show. Do you hear
it was changing these a swell.
So let me just go back in here and change into O R
So this is how you can actually ah, leverage the proxy change and lateral and vertical movement thio, um,
to compromise author machines behind maybe ah, network address, translation or not, or behind a villain or something like that. Um,
sometimes it will work. This was to show you that you can actually use, um,
dynamic tunnelling or yeah, dynamic. Pour forward in our local for forward. And you can also use reverse sport forwarded, but for immunity for this to make more sense, you have to really watch the previous video. Yeah, you can actually leverage all of these capabilities from the SS H. Donald's.
get what you want and in this case, uh, maybe creating, ah,
dynamic pour forward. It was more useful for us than a local performer, things that they had a local performer and my B word with daughter tunics. But, you know, that's the point you can actually use, uh, any type of proxy or any type of poor forwarding that will work for your scenario
on the point is that you can move from one machine to the other without any problems.
Can you reach machines behind a network address? Translation or not, which is a distinct naked as you can. You can actually do that. I mean, maybe that this not working behind ah firewall or ah, machine you already compromised. Yeah. You can actually reach those. That's kind of the whole thing. We're pivoting our people in
Oh, are you know, lateral and vertical movement.
Uh, can we actually get remote control? But using this technique Yeah, we can We can actually, we can Yeah, we definitely can.
We said that in the video with the MSF council by executing EMS of counsel through Brooks change,
we and this video will learn some concepts of this of this technique. And we implemented some tools and commands to execute this technique, and we saw how malicious it can be.
Ah, supplemental materials. It's always the hacker playbook. And every possible sorted you confined in goal and YouTube you can actually, actually, people I use a really cool modules are really cool. Both explosive ation modules in the arms of counsel or with the with
MSF Uh, I'm sorry we didn't matter. Predator Shell. You can actually execute a pivoting with that. So, yeah, I encouraged you to to actually read that.
Looking forward in the next video, we'll see some techniques to erase your tracks or, you know, clear logs and everything's that. This is the system administrators can't find you. Or can I at least trace you back to your location or your order activities?
Well, that's it for today, folks. I hope you enjoyed the video and talk to you soon.