regeorg

pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.


Keywords
pivot, socks-proxy, socks4, socks4-proxy, socks5, socks5-proxy
License
MIT
Install
pip install regeorg==2.0.2

Documentation

reGeorg

Fork of regeorg to include support for python2 and python3 and to have proper socks4 and socks5 support. Since original regeorg is not actively maintained, this fork is born.

  _____   ______  __|___  |__  ______  _____  _____   ______
 |     | |   ___||   ___|    ||   ___|/     \|     | |   ___|
 |     \ |   ___||   |  |    ||   ___||     ||     \ |   |  |
 |__|\__\|______||______|  __||______|\_____/|__|\__\|______|
                    |_____|
                    ... every office needs a tool like Georg

Installation

You can install it via pip:

pip install regeorg

Quick usage

Place tunnel script from tunnels subdirectory somewhere on the webserver and issue following command locally:

reGeorgSocksProxy.py -p 1080 -u http://upload.sensepost.net:8080/tunnel/tunnel.jsp

Now, you can browse and pivot using socks4/socks5, for example:

curl -x socks5://127.0.0.1:1080/ http://192.168.1.1

Dependencies

reGeorg works with both Python 2.7 and Python 3.x and the following modules:

  • [urllib3] - HTTP library with thread-safe connection pooling, file post, and more.

Usage

usage: reGeorgSocksProxy.py [-h] [-c] [-l] [-p] [-r] [-s] -u  [-v]

Socks server for reGeorg HTTP(s) tunneller

optional arguments:
  -h, --help           show this help message and exit
  -c , --creds         Credentials for basic authentication as user:pass
  -l , --listen-on     The default listening socks address
  -p , --listen-port   The default listening socks port
  -r , --read-buff     Local read buffer, max data to be sent per POST
  -s , --ssl           check TLS/SSL certificate
  -u , --url           The url containing the tunnel script
  -v , --verbose       Verbose output[INFO|DEBUG]
  • Step 1. Upload tunnel.(aspx|ashx|jsp|php) to a webserver (How you do that is up to you)

  • Step 2. Configure you tools to use a socks proxy, use the ip address and port you specified when you started the reGeorgSocksProxy.py

** Note, if you tools, such as NMap doesn't support socks proxies, use [proxychains] (see wiki)

  • Step 3. Hack the planet :)

Example

$ python reGeorgSocksProxy.py -p 8080 -u http://upload.sensepost.net:8080/tunnel/tunnel.jsp

License

MIT

More agents/tunnels

List of tunnels / agent compatible with this release

References

References to original tool, similar tools and forks

Credits

This fork is maintained by @k0st.

Original by:

Tools: