Port Forwarding - Tunneling

Chisel

Portforwarding,

Forwarding remote port 8080 to localhost

On kali,

./chisel server --reverse --port 9001

example,
./chisel server --reverse --port 9001

On target,

.\chisel.exe client <kali-ip>:9001 R:<local-port>:127.0.0.1:<target-port>

example,
.\chisel.exe client 10.10.14.38:9001 R:8080:127.0.0.1:8080

Sock5 proxy with chisel,

On kali,

./chisel server -p 9001 --socks5 --reverse

On target,

R:5000:socks

  • the R means that we want to perform a reverse port forward.

  • 5000 will be the port on the attacker machine that will act as the entry point to our SOCKS5 proxy; and

  • socks simply means we are using the SOCKS protocol.

Add socks5 127.0.0.1 5000 to /etc/proxychains.conf

  • Don't forget to disable DNS resolution over proxychains.

udp port forward

Sshuttle

This is the best tunneling tool

Standalone (compiled and ready to be executed) binaries,

SSH

Port forwarding,

forwards remote host 10.10.10.99:2049 back to localhost:2049

Tunneling,

Regeorg

Last updated