Socat
Socat is a easy tool to use when you want to port forward. It's a bidirectional relay tool that can create pipe sockets between 2 independent byte streams and transfer data between them.
Starting Socat Bind Shell Listener (From Jump host)
These are three ways of achieving the same result.
172.16.5.19
& next_victim_ip
are computers within the victim network.
8080
& 2345
is a port number we've decided to choose to use.
8443
& 5432
is the port number of the service we're trying to connect to. (Web server & PostgreSQL)
Metasploit can be useful for transferring binaries to a victim:
NOTE: This is obviously not practical in real world scenarios as metasploit is highly signatured and will be dropped by AV. However, for CTF's & Exams this can be a quick and useful way of achieving what you want.
Creating the Windows Payload (Delivered to Windows host)
LHOST: Jump host IP address
Configuring & Starting the multi/handler (on Attack host)
Last updated