Skip to content
/ Ipivot Public

Have you ever successfully found a vulnerability that is exploitable after going through the stages of →Information GATHERING → Enumeration → Exploitation using Metersploit, after successfully gaining access to the target host; only to find that your meterpreter session from this pivot point is not stable?

Notifications You must be signed in to change notification settings

fort3/Ipivot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 

Repository files navigation

Ipivot

             # # # # # # #
          # # # # # # #
              # #           
             # #            
            # #         # # # #         #   #   #  #
           # #          #      ##     #   #    #  #  # 
          # #           #       ##  #   #          #  #   
         # #            #     ##    #   #          #   #  
        # #             #   ##       #    #       #   #
       # #              ##       # #   #    #   #   #  # #   
  # # # # # #           ##         # #   # #  #  #    # #
 # # # # # #            ##           # #            # #    
                        ##             # #        # #                   
                        ##               # #    # #                       
                        ##                  ####   2.0
                    
IPIVOT 2.0 - Red Teaming Tool
By: @fort3 - Fortune Sam Okon
    @TrimarcJake - Jake Hildreth
Description: A little pivoting tool for when your favourite meterpreter shell fails...
Prequisites: Identify and Gain Initial Foothold on Target as Administrator
Addition: Clear the command history in PSReadLine\ConsoleHost_history.txt and sessions

PS: If you happen to find this tool useful then I wouldn't mind a mention ;)

Instructions for use

Change the Parameters below depending on your needs:

PARAMETER ConnectingPort
#Change this to the connecting port 

PARAMETER ListeningPort
#Change this to the listening port 

PARAMETER ListeningAddress
#Change this to the listening IP address you want to set the forwarding to 

PARAMETER Network
#Change this to the target network you're working on i.e 192.168.0 

PARAMETER HostRange
#Change this to determine the range or leave as default depending on your needs

Script execution example

.\Ipivot.ps1 -ConnectingPort 9080 -ListeningPort 9999 -Network 127.0.0 -ListeningAddress 127.0.0.1 -HostRange (1..200)

For Errors like below:

image

Enter the command below in the Powershell CLI

Set-ExecutionPolicy RemoteSigned -Scope Process

Example Output:

Ipivot 2 0_Parameters_5

CAUTION

As this tool performs a high impact action like clearing the command history and PSReadline sessions and file, you will be asked to confirm this action with a prompt. Ipivot 2 0_Parameters_3

DISCLAIMER: Thoughts, Opinions and the Information in this script is strictly for educational purposes alone and use of any code or technique for unlawful or unauthorized activities is strictly prohibited.

This project is free to use!!

Would appreciate some feedback though ;)

About

Have you ever successfully found a vulnerability that is exploitable after going through the stages of →Information GATHERING → Enumeration → Exploitation using Metersploit, after successfully gaining access to the target host; only to find that your meterpreter session from this pivot point is not stable?

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published