Networking
Port Forwarding for exploits
Attacker Machine -> Pivot Machine -> Victim Machine
SSH Remote Port Forwarding
On Pivot Machine, this forwards traffic from port 1234 on the attacker Machine to port 3389 on the Victim Machine
SSH Local Port Forwarding
On Pivot Machine, add the following firewall rules
On Pivot Machine, this forwards traffic from port 8001 on the attacker Machine to port 80 on the Pivot Machine
Socat portforwarding
On the Pivot Machine, add the following firewall rules
On the Pivot Machine, to forward the Attacker Machine to the Victim Machine
On Pivot Machine, to forward the Victim Machine to the Attacker Machine
SOCKS
On the Pivot Machine
On the Attacker machine, setup proxychains
under /etc/proxychains.conf
On the Attacker Machine, prefix commands with proxychains
to send traffic to port 9050, which is then forwarded to the Pivot Machine
plink.exe
Assuming you already have a shell on the victim machine, we can use
plink.exe
on the victim machine to forward traffic from the attacker machine to other internal networks in the victim network
This creates a SSH connection to our attacker machine as root, and forwards any traffic from the attacker port to the victim port on 127.0.0.1
Last updated