This blog is written as I was going over a material that takes advantage of Chisel. A very flexible and easy-to-use port forwarding & proxy forwarding utility. During this blog. I figure it would be nice to show how I come up with the theory and put it into practice. The general concepts are the same as you will find in any other blogs that are out there.


What are SOCKS Proxies

Link

Wiki

I linked these two articles there because the purpose of this blog was not to harp on the knowledge of how to build a SOCKS from scratch. But rather what and how can we take advantage of it during our Red-Teaming/Penetration Testing.

Network Lab Setup

Untitled

I want to give a quick tutorial on how to set up your own NATed networks so you can test out the theory yourself, and when next time you encountered something like this, you will know how to approach to it

Untitled

1. Kali Machine

In our attack machine, I am running Kali as a Linux VM in Virtualbox. There are plenty of reads on how to spin one up, therefore, it will not be mentioned here.

Here is my network config. You can set them up by

  1. go to your Virtualbox host network-manager

Untitled

  1. Hit the Create button and there should be one VirtualBox Host-Only Ethernet Adapter generated for you, And make sure you toggle the DHCP Server Enable

    Untitled

  2. Next, We will create the second network adapter, for our proxy server to act as the Proxy Server.

Untitled