This blog is written as I was going over a material that takes advantage of Chisel. A very flexible and easy-to-use port forwarding & proxy forwarding utility. During this blog. I figure it would be nice to show how I come up with the theory and put it into practice. The general concepts are the same as you will find in any other blogs that are out there.
I linked these two articles there because the purpose of this blog was not to harp on the knowledge of how to build a SOCKS from scratch. But rather what and how can we take advantage of it during our Red-Teaming/Penetration Testing.
I want to give a quick tutorial on how to set up your own NATed networks so you can test out the theory yourself, and when next time you encountered something like this, you will know how to approach to it
In our attack machine, I am running Kali as a Linux VM in Virtualbox. There are plenty of reads on how to spin one up, therefore, it will not be mentioned here.
Here is my network config. You can set them up by
Hit the Create
button and there should be one VirtualBox Host-Only Ethernet Adapter
generated for you, And make sure you toggle the DHCP Server Enable
Next, We will create the second network adapter, for our proxy server to act as the Proxy Server.