Bypassing Firewall with Forward Relays
Lab Setup
Block port for incoming TCP packet on Victim Machine
sudo iptables -A INPUT -s <attacker ip> -p tcp --dport 22 -j DROPAllow TCP packet on another port on Victim Machine
iptables –I INPUT 1 –s <attacker ip> –p tcp --dport 4444 –j ACCEPTCheck netcat communication between Attacker and Client
On Victim Machine
nc –v –l –p 4444On the Kali Machine
nc 192.168.1.7 4444Use Netcat Realy Backpipe to Access SSH Service
Victim Machine
Attacker Machine
Access SSH Through Netcat Relay
REFERENCES
Last updated