-
-
Notifications
You must be signed in to change notification settings - Fork 212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please implement ability to port forward after catching reverse shell #98
Comments
After playing with using the
However, since I am testing with a Windows host as the remote machine, this fails since it requires both a Unix machine with |
This is still something that lacks implementation. I will have to dig a bit into cmd.exe and powershell.exe capabilities for enumeration and self injection. |
cmd.exe - finds files in
|
I will probably first have the forwarding feature as a generated payload here: https://github.com/cytopia/kusanagi. |
potential solution: upload this python tcp-forward script and execute; there is also a perl version on this site |
ISSUE TYPE
SUMMARY
Currently, you cannot combine a listener (
-l
) with a port forward (-L
or-R
). I would like a way to create a port forward through this tunnel after my listener has caught a reverse shell. I recommend implementing a command in the shell similar to theupload
ordownload
commands that will allow you to specify ports to forward.reverse
andlocal
shouldn't conflict with any host shell commands, or perhapsreverse-pf
andlocal-pf
.Goal
Often I find that after connecting to a machine that I need to add port forwarding for connecting to some service that is running on that machine. I do not currently know an easy way to upgrade a shell with port forwarding other than compiling an exploit and using meterpreter, using plink or chisel, or if I have credentials, using SSH. Most of these require running an additional binary on the host that may or may not be blocked from running.
The text was updated successfully, but these errors were encountered: