-
Run
ifconfig
and look for extra interfaces, in this example, we findens224
, which connects to a network our current machine can't reach directly. -
If Chisel has not yet been installed, clone the repository using the following command:
git clone https://github.com/jpillora/chisel.git
-
Navigate to the Chisel directory and build the binary using the command below:
cd chisel && go build
-
Alternatively, if you prefer not to build the binary yourself, you can download a pre-built version. After downloading, unzip the file using:
gzip -d chisel_1.10.0_linux_amd64.gz
-
Transfer the Chisel binary to the target machine (Refer to the File Transfer section for more details). Then, execute the Chisel server with:
chmod +x chisel && ./chisel server -v -p 1234 --socks5
NOTE
The Chisel server will listen for incoming connections on port 1234, utilizing SOCKS5 (--socks5), and forward traffic to all networks accessible from the pivot host. In our scenario, the pivot host has an interface on the 172.16.5.0/23 network, enabling us to reach hosts within this network.
-
On the attack host, start the Chisel client and connect to the Chisel server using:
./chisel client -v 10.129.236.111:1234 socks
-
Modify the proxychains.conf file to include the following configuration:
socks5 127.0.0.1 1080