Copyright: Red Block contact: https://t.me/redblock_team We have multiple cases in which we have to port forward and we can use different tools for that.
Attacker Machine’s IP (KALI-MACHINE) | 192.168.118.4 |
---|---|
Attacker User | kali |
Targeted Machine’s IP (CONFLUENCE01) | 192.168.50.63 |
Compromised User on CONFLUENCE01 | conf_user |
Machine Accessible from Target Machine (PGDATABASE01) | 10.4.50.215 |
Compromised User on PGDATABASE01 | database_admin |
Machine Accessible from PGDATABASE01 Machine (HRSHARES) | 172.16.50.217 |
2nd Machine Accessible from Target Machine (MULTISERVER03) | 192.168.51.50 |
Case-I: When we have to forward only internal open ports from target machine to our machine
Case-II: When we have to forward ports between a machine on different subnet connected to the compromised target machine to our attack machine
Case-III: When we have to forward ports of a machine on different subnet connected to the compromised target machine which is in turn connected to one more machine on different subnet to our attack machine.
Case-IV: When we have to forward ports of machines to two different subnets connected to our compromised target machine to our attack machine
Case-V: When we have to pivot between different forests to access all machines: Perfect guide for such cases is: https://ap3x.github.io/posts/pivoting-with-chisel/