THC-Grenzgaenger 0.3 review
DownloadGrenzgaenger is a Socks like hacker tool for tunneling nmap, netcat and exploits transparently through systems into protected network
|
|
Grenzgaenger is a Socks like hacker tool for tunneling nmap, netcat and exploits transparently through systems into protected networks.
THC-Grenzgaenger tool is in ALPHA state!
Please dont use it for anything illegal. Just play around with it, and it would be nice if you would give me feedback.
Image the following:
You are here this is a firewall this is a DMZ server where
| allowing only port 443 you able to put a tool on
| | |
v v v
*** *** ***
***-------------------------***------------------+-------***
*** *** | ***
|
+-> +-------***
| |
many more DMZ server --+-> +-------***
| |
+-> +-------***
and you would like to reconnaissance on that DMZ as you have been able to
get at least one server there.
Interactive login maybe a no-go, as it might be a Win95 machine, chrooted
environment on linux, or some weird old HP-UX 9.0 machine were all the cool
tools dont compile.
This is were Grenzgaenger comes into play.
It allows you to use many tools on your local console, as if you *would*be*
having your laptop hooked up to the DMZ.
I currently just verified that the stuff is working on my SuSE Linux 8.1.
Your experience may vary.
How to use it:
Run the first tunnel proxy server on your own machine:
./ggd
Do the same on the target machine. Use the -p option to choose a different listening port than 443.
Edit the gg shell script and change the
GG_TUNNEL="127.0.0.1:444:test"
value to point to the target machine.
e.g.
GG_TUNNEL="192.168.13.3:443:test"
In the session where you want to use the proxy, just do:
gg command options
e.g.
gg netcat 192.168.13.3 23
THC-Grenzgaenger 0.3 keywords