Skip to content
/ reGeorg Public
forked from sensepost/reGeorg

The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. - Now with Proxy and Auth Support

License

Unknown, Unknown licenses found

Licenses found

Unknown
LICENSE.html
Unknown
LICENSE.txt
Notifications You must be signed in to change notification settings

lpohl/reGeorg

 
 

Repository files navigation

reGeorg

  _____   ______  __|___  |__  ______  _____  _____   ______
 |     | |   ___||   ___|    ||   ___|/     \|     | |   ___|
 |     \ |   ___||   |  |    ||   ___||     ||     \ |   |  |
 |__|\__\|______||______|  __||______|\_____/|__|\__\|______|
                    |_____|
                    ... every office needs a tool like Georg

willem@sensepost.com / @_w_m__

sam@sensepost.com / @trowalts

etienne@sensepost.com / @kamp_staaldraad

Version

1.0a (modifyed by lpohl)

Dependencies

reGeorg requires Python 2.7 and the following modules:

  • urllib3 - HTTP library with thread-safe connection pooling, file post, and more.
  • kerberos - KRB5 Library for Negotiate Authentication against a Proxy
  • python > 2.7.5? I had strange problems with the default python (2.7.4) on Kali Linux so I used pyenv and python 2.7.10

Usage

$ reGeorgSocksProxy.py [-h] [-l] [-p] [-r] -u  [-v] [-X] [-A] [-a]

Socks server for reGeorg HTTP(s) tunneller

optional arguments:
  -h, --help           show this help message and exit
  -l , --listen-on     The default listening address
  -p , --listen-port   The default listening port
  -r , --read-buff     Local read buffer, max data to be sent per POST
  -u , --url           The url containing the tunnel script
  -v , --verbose       Verbose output[INFO|DEBUG]
  -X , --proxy         Set Proxy URL (http://myproxy:8080)
  -A , --authproxy     Use Kerberos Auth with the Proxy
  -a , --auth          Use Basic Auth for tunnel Script Access ( -a user:pass)

  • Step 1. Upload tunnel.(aspx|ashx|jsp|php) to a webserver (How you do that is up to you)

  • Step 2. Configure you tools to use a socks proxy, use the ip address and port you specified when you started the reGeorgSocksProxy.py

** Note, if you tools, such as NMap doesn't support socks proxies, use proxychains (see wiki)

  • Step 3. Hack the planet :)

Example

Direct HTTP Access to Uploaded Script
$ python reGeorgSocksProxy.py -p 8080 -u http://upload.sensepost.net:8080/tunnel/tunnel.jsp

Access over Proxy + KRB Auth to HTTPS and Basic Auth Protected tunnel script
$ python reGeorgSocksProxy.py -u https://upload.sensepost.net/tunnel/tunnel.jsp -x http://proxy.sensepost.net:8080 -A -a user:pass

License

MIT

About

The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. - Now with Proxy and Auth Support

Resources

License

Unknown, Unknown licenses found

Licenses found

Unknown
LICENSE.html
Unknown
LICENSE.txt

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 46.5%
  • Java 16.6%
  • Classic ASP 16.5%
  • JavaScript 10.3%
  • PHP 10.1%