Abstract
PivotSuite is a portable, platform independent and powerful network pivoting toolkit, which helps Red Teamers/Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, which can be uses as a Server or as a Client.
PivotSuite as a Server: If the Compromised host is directly accessible (Forward Connection) from our pentest machine, then we can run pivotsuite as a server on a compromised machine and access the different subnet hosts from our pentest machine, which was only accessible from a compromised machine.
PivotSuite as a Client: If the Compromised host is behind a Firewall/NAT and isn’t directly accessible from our pentest machine, then we can run pivotsuite as a server on pentest machine and pivotsuite as a client on compromised machine for creating a reverse tunnel. Using this, we can reach different subnet hosts from our pentest machine, which was only accessible from a compromised machine.
Key Features:
- Supported Forward & Reverse TCP Tunneling
- Supported Forward & Reverse Socks5 Proxy Server
- UDP over TCP and TCP over TCP Protocol Supported
- Corporate Proxy Authentication (NTLM) Supported
- Inbuilt Network Enumeration Functionality, Eg. Host Discovery, Port Scanning, OS Command Execution PivotSuite allows to get access to different Compromised host and their network, simultaneously (Act as C&C Server) Single Pivoting, Double Pivoting and Multi-level pivoting can perform with help of PivotSuite PivotSuite also works as SSH Dynamic Port Forwarding but in the Reverse Direction
Advantage Over Other tools:
- Doesn’t required admin/root access on Compromised host
- PivotSuite also works when Compromised host is behind a Firewall / NAT, When Only Reverse Connection is allowed
- No dependency other than python standard libraries
- No Installation Required
- UDP Port is accessible over TCP