Tunneling and Port Forwarding
Last updated
Last updated
https://pentest.blog/explore-hidden-networks-with-double-pivoting/
socat
proxytunnel
proxychains
corkscrew
For this technique, it is necessary to be able to upload a file to a webserver.
1. reGeorgFile upload to the server correct
Tunnel creationpython reGeorgSocksProxy.py -p 5555 -u "http://<ip>/admin/uploads/reGeorg.jsp"
Proxychains config
proxychains nmap -F -sT 127.0.0.1
proxychains mysql -u root -p -h 127.0.0.1
proxychains ssh localhost
Reference: https://sensepost.com/discover/tools/reGeorg/
2. ABBTTS
Upload File
Config proxychains and create the tunnelpython abpttsclient.py -c tomcat_walkthrough/config.txt -u http://ip/abptts.jsp -f 127.0.0.1:22222/127.0.0.1:22
Usagessh -p 22222 user@127.0.0.1
Reference: https://github.com/nccgroup/ABPTTS
In this case this is going to be used to access Burp listening on a Windows NATed VM from other PCs in the same network as the Windows Host.
From the Windows Host machine (IP: 192.168.1.206)
From other PC on the Windows Host machine network (IP: 192.168.1.69)
Configure proxychains.conf
:
This command ahead makes Burp (which is listening on the NATed machine) accessible from ip on port 8081
Now, configure the Proxy in the browser:
All the traffic is logged on the NATed machine Burp.
Reference: https://github.com/p3nt4/Invoke-SocksProxy
Traffic forward over SSH without needing to ssh -D <port>
1. socatsocat TCP4-LISTEN:80,fork TCP4:REMOTE-HOST-IP-ADDRESS:80
2. iptablesiptables -I INPUT -p tcp -m tcp --dport 80 -j ACCEPTiptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination REMOTEADDR:80iptables -t nat -A POSTROUTING -j MASQUERADEiptables -I FORWARD -j ACCEPTiptables -P FORWARD ACCEPTsysctl net.ipv4.ip_forward=1