In the process of infiltration, you will always encounter the following problems:
I took a windows/linux, but in the intranet, and can not mention the right, my goal is the network of other machines, how to do?
Of course for Windows, there is Htran this artifact, my vision is mainly for Linux, because there is a large cluster of internal network of institutions, I met most of the Linux is at the border.
Traditional lcx with C write, the Internet has disclosed the source code, has the function of port anti-connection, the parameter is (-slave), through the program can be in the intranet part of the port forwarding to their own machine, but there are obvious drawbacks:
1. After the use of one time, the second need to continue to execute the command, the efficiency is not high.
2. Cannot be forwarded entirely for all ports, such as HTTP service ports. And we know that there are many Web services in the intranet may be flawed, if we can penetrate into the words of our data collection, analysis and post-infiltration are very helpful.
3. Can not be multi-threaded simultaneous connection.
There are three ways to use:
Native execution: server.py 8888 9999
,
Broiler execution: client.py-m 1 native IP 8888 #这样就把socks5代理服务转出来了
Broiler Execution: Client.py-m 2 intranet IP intranet port native IP 8888 #这样就把内网别的端口服务转出来了
Broiler Execution: client.py-m 3 7070 So it's just listening on the broiler. 7070 Ports Open SOCKS5 Proxy Service
:
Http://www.nitscan.com/down/reprocks.zip
This article is from the "Sanr" blog, make sure to keep this source http://0x007.blog.51cto.com/6330498/1627033
Linux/windows boundary penetration Artifact---reprocks (rebound agent)