Port Forwarding - Tunneling
Chisel
Portforwarding,
Forwarding remote port 8080 to localhost
On kali,
./chisel server --reverse --port 9001
example,
./chisel server --reverse --port 9001On target,
.\chisel.exe client <kali-ip>:9001 R:<local-port>:127.0.0.1:<target-port>
example,
.\chisel.exe client 10.10.14.38:9001 R:8080:127.0.0.1:8080Sock5 proxy with chisel,
On kali,
./chisel server -p 9001 --socks5 --reverseOn target,
R:5000:socks
the
Rmeans that we want to perform a reverse port forward.5000will be the port on the attacker machine that will act as the entry point to our SOCKS5 proxy; andsockssimply means we are using the SOCKS protocol.
Add socks5 127.0.0.1 5000 to /etc/proxychains.conf
Don't forget to disable DNS resolution over proxychains.
udp port forward
Sshuttle
This is the best tunneling tool
Standalone (compiled and ready to be executed) binaries,
SSH
Port forwarding,
forwards remote host 10.10.10.99:2049 back to localhost:2049
Tunneling,
Regeorg
Last updated