Tunneled Hub - A tool for pivoting in a target's network with multiple attackers.
In order to execute the client, first, create a configuration file. You may copy default_config.json
, or copy it from here:
{
"server": {
"host": "127.0.0.1",
"port": 12345
},
"client": {
"tap_name": null,
"mac_address": null,
"ip_address": null,
"ip_netmask": null
}
}
Be sure to change the host ip and port. In addition, you may preset the name of the tap device, MAC address, IP and Netmask. Here is an example:
{
"server": {
"host": "127.0.0.1",
"port": 12345
},
"client": {
"tap_name": "hometap",
"mac_address": "66:55:44:33:22:11",
"ip_address": "192.168.1.150",
"ip_netmask": "255.255.255.0"
}
}
- Note that some MAC addresses are illegal, and the OS will not allow their use.
Once you have your configuration file ready, just execute:
./client -c CONFIGURATION_FILE
- Note that the project is written in python3 and uses
f-strings
. Make sure to have python3.6 or above. - Note that in order to create a TAP device,
CAP_NET_ADMIN
permission capability is required. Root user has this permission capability, or you can assign it to a user.