Tunneling and Port Forwarding
Nmap tip
Bash
# On the jump server connect the port 3333 to the 5985
mknod backpipe p;
nc -lvnp 5985 0<backpipe | nc -lvnp 3333 1>backpipe
# On InternalA accessible from Jump and can access InternalB
## Expose port 3333 and connect it to the winrm port of InternalB
exec 3<>/dev/tcp/internalB/5985
exec 4<>/dev/tcp/Jump/3333
cat <&3 >&4 &
cat <&4 >&3 &
# From the host, you can now access InternalB from the Jump server
evil-winrm -u username -i JumpSSH
Local Port2Port
Port2Port
Port2hostnet (proxychains)
Reverse Port Forwarding
VPN-Tunnel
SSHUTTLE
Meterpreter
Port2Port
SOCKS
Cobalt Strike
SOCKS proxy
rPort2Port
rPort2Port local
reGeorg
Chisel
socks
Port forwarding
Rpivot
Socat
Bind shell
Reverse shell
Port2Port
Port2Port through socks
Meterpreter through SSL Socat
SSL Socat Tunnel
Remote Port2Port
Plink.exe
Windows netsh
Port2Port
SocksOverRDP & Proxifier
Proxify Windows GUI Apps
NTLM proxy bypass
Cntlm
YARP
DNS Tunneling
Iodine
DNSCat2
In PowerShell
Port forwarding with dnscat
Change proxychains DNS
Tunnels in Go
ICMP Tunneling
Hans
ptunnel-ng
ngrok
Installation
Basic usages
Tunneling TCP
Exposing files with HTTP
Sniffing HTTP calls
Tunneling internal HTTP service
ngrok.yaml simple configuration example
Other tools to check
Last updated

