Network Pivoting

sshuttle

SSH required on machine.

sshuttle -r linux-user@10.200.124.33 10.200.124.30/24

SSH Tunnel

Remote Port Forward

  • Connects specific ports on local host to remote host

ssh -R 1122:10.5.5.11:22 -R 13306:10.5.5.11:3306 kali@10.11.0.4 
  • This connects local kali ports 1122, 13306 to remote ports 22, 3306. .11 is remote host, .4 is kali

Automatically Accept Host Key (For Connecting Back to Kali)

-o "UserKnownHostsFile=/dev/null"

Don't prompt for Host Key

-o "StrictHostKeyChecking=no" 
ssh -R 1122:10.5.5.11:22 -R 13306:10.5.5.11:3306 -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" kali@10.11.0.4 

Creating SSH Keys & Rules

Rules for Use on Pivot Point

Chisel

https://github.com/jpillora/chisel

  • Binaries must exist on attacker AND victim (proxy) machine to work

  • Proxychains conf must be configured to “socks5 127.0.0.1 PORT(1080?)” as Chisel uses socks5

Reverse SOCKS Proxy

#Attacking Box (Listener)

#Victim

Forward SOCKS Proxy

#Victim

#Attacking Box

Remote Port Forward

#Attacking Machine

#Victim Machine

Local Port Forward

#Victim Machine

#Attacking Machine

Last updated