Port Redirection and Tunneling
Last updated
Was this helpful?
Last updated
Was this helpful?
Was this helpful?
ssh -L <local-port-to-listen>:<remote-host>:<remote-port> remote-host
ssh -R <remote-port-to-listen>:<local-host>:<local-port> remote-host
ssh -D <local-port-to-listen> <remote-host>
This command creates a SOCKS proxy listening at <local-port>. It is required to configure the browser to point to the SOCKS proxy at <local-port> to redirect all traffics to <remote-host>.
Change proxy value to desired proxy server.
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4 127.0.0.1 9050
proxychains nmap -Pn -sT -sV -p 445,446 $TARGET_IP
Add route to a destined subnet through a session
Run socks4a server to listen traffics from proxychains
msf > route add 172.16.85.0 255.255.255.0 2
msf > use auxiliary/server/socks4a