Ligolo-ng
Instead of using a SOCKS proxy or TCP/UDP forwarders, Ligolo-ng creates a userland network stack using Gvisor. When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated, and then transmitted to the agent remote network.
This allows running tools like nmap without the use of proxychains (simpler and faster).
First, you will need Ligolo-ng. Head to the GitHub, and download a Ligolo agent from Releases for the architecture of the victim, and a Ligolo proxy for your Kali.
We will add a new interface to our machine, and add routes through this interface for our target networks. First, we must create our new tunnel interface, bring the interface up, and add our route:
sudo ip tuntap add user kali mode tun ligolo
sudo ip link set ligolo upAdd route want to access
sudo ip route add 10.10.120.0/24 dev ligolo
sudo ip route add 10.10.121.0/24 dev ligolo
sudo ip route add 10.10.122.0/24 dev ligolo
sudo ip route add 10.10.123.0/24 dev ligoloSpawn our proxy (on Kali)
./proxy -selfcert -laddr 0.0.0.0:8080 Connect our agent (on Victim)
.\agent.exe -connect 10.10.14.7:8080 -ignore-cert
control+z to background shell (if using MetaSploit)After the agent has joined, we can type ‘session’, and using the Enter key, select our session. Once selected, we can start our proxy by typing ‘start’.
Should look as follows (on Kali side)

You can now nmap (or else) without the need of proxychains
Tooling
Last updated