Network Pivoting
sshuttle
SSH required on machine.
sshuttle -r linux-user@10.200.124.33 10.200.124.30/24SSH Tunnel
Remote Port Forward
Connects specific ports on local host to remote host
ssh -R 1122:10.5.5.11:22 -R 13306:10.5.5.11:3306 kali@10.11.0.4 This connects local kali ports 1122, 13306 to remote ports 22, 3306. .11 is remote host, .4 is kali
Automatically Accept Host Key (For Connecting Back to Kali)
-o "UserKnownHostsFile=/dev/null"Don't prompt for Host Key
-o "StrictHostKeyChecking=no" ssh -R 1122:10.5.5.11:22 -R 13306:10.5.5.11:3306 -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" kali@10.11.0.4 Creating SSH Keys & Rules
Rules for Use on Pivot Point
Chisel
https://github.com/jpillora/chisel
Binaries must exist on attacker AND victim (proxy) machine to work
Proxychains conf must be configured to “socks5 127.0.0.1 PORT(1080?)” as Chisel uses socks5
Reverse SOCKS Proxy
#Attacking Box (Listener)
#Victim
Forward SOCKS Proxy
#Victim
#Attacking Box
Remote Port Forward
#Attacking Machine
#Victim Machine
Local Port Forward
#Victim Machine
#Attacking Machine
Plink
Last updated