Stowaway is Multi-hop proxy tool for security researchers and pentesters
Users can easily proxy their network traffic to intranet nodes (multi-layer)
PS: The files under demo folder are Stowaway’s beta version,it’s still functional, you can check the detail by README.md file under the demo folder.
Features
Usage
It can be excuted as two kinds of mode: admin && agent. If you don’t want to compile the project by yourself, you can check the release folder to get ONE!
Simple example:
Admin mode:./stowaway admin -l 9999 -s 123
Meaning:
admin It means Stowaway is started as admin mode
-l It means Stowaway is listening on port 9999 and waiting for incoming connection
-s It means Stowaway has used 123 as the encrypt key during the communication
Be aware! -s option’s value must be as same as the agents’
For now, there are only three options above are supported!
agent mode: ./stowaway agent -m 127.0.0.1:9999 -l 10000 –startnode -s 123 -r
Meaning:
agent It means Stowaway is started as agent mode
-m It means Stowaway’s monitor node’s address (In this case,it’s the node we started above)
-l It means Stowaway is listening on port 10000 and waiting for incoming connection
-s It means Stowaway has used 123 as the encrypt key during the communication
–startnode It means Stowaway is started as FIRST agent node(if the node is the first one , you MUST add this option!!! And there are two submode of agent mode,if you want to start the second, third one….., just remove this option)
-r It means you want to start the node in reverse mode(For instance: you can add node 2 into the net via node 1 actively connect to node 2, instead of node 1 just waiting for the connection from node 2 )
Be aware! -s option’s value must be as same as the agents’
For now, there are only five options above are supported!
Example
For instance(one admin;one startnode;two simple nodes)
Now, use admin and type in “use 1” -> “connect 127.0.0.1:10001” ,then you can add node 1 into the net
When all agent nodes connected,check the topology in admin
Now we manipulate the second simple node through admin
Open the remote interactive shell
Now you can use interactive shell (the second simple node’s) through admin
Now you can use the admin’s port 7777 as the socks5 proxy service
And it can proxy your traffic to the second simple node and the second simple node will do its work as socks server( When you want to shut down this socks5 service, just type in “stopsocks” under this mode to turn off it)
And it can proxy your ssh traffic to the second simple node and the second simple node will do its work as ssh cilent. PS: In this function,you can type in pwd
to check where you currently are
For more detail, just type help to get further information
Attention
project
is coding just for fun , the logic structure and code structure are not strict enough, please don’t be so serious about itgo build -ldflags="-w -s"
to do thatCredit: rootkiter#Termite & Venom
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…