内网隧道代理技术

端口转发相关工具和方法

LCX端口转发

LCX是一款端口转发工具,分为Windows版和Linux版,Linux版本为PortMap。LCX有端口映射和端口
转发两大功能,例如当目标的3389端口只对内开放而不对外开放时,可以使用端口映射将3389端口映
射到目标的其他端口使用;当目标处于内网或目标配置的策略只允许访问固定某一端口时,可以通过端
口转发突破限制。 Windows版的LCX用法:
端口转发:
Lcx -listen <监听slave请求的端口><等待连接的端口>
Lcx -slave <攻击机IP><监听端口><目标IP><目标端口>
端口映射:
Lcx -tran<等待连接的端口><目标IP><日标端口>
实验场景1
由于配置了防火墙只允许web访问,这个时候攻击者想访问3389端口,远程连接是不可以的,就需要使用LCX进行端口转发Web服务器开启了80端口,3389端口不允许出网,可以将web服务器的3389端口转发到允许出网的53端口,这个时候攻击者在本地监听53端口并且转发到攻击机的1111端口,这个时候攻击者连接自己的1111端口,等于访问web服务器的3389端口.
image-20241019143613870
image-20241019144031084
image-20241019144229713
image-20241019144243042
image-20241019144259449
image-20241019144919747
image-20241019144951086
image-20241019145125266
image-20241019145141709
image-20241019145954464
image-20241019150610892
image-20241019150730530
image-20241019150750027

SSH端口转发

image-20241019161141605
image-20241019161806585
image-20241019162734045
image-20241019162847415
image-20241019185457297
image-20241019185840575

NETSH端口转发

image-20241019193909572
image-20241019194030253
image-20241019194045431
image-20241019194711446

反弹shell的场景和方法

nc正向反弹与反向反弹

image-20241019210024567
image-20241019210650500
image-20241019210823140
image-20241019210948197
image-20241019211054971
image-20241019211850001
image-20241019211902148
image-20241019212043734
image-20241019212054674

powercat反弹shell

image-20241019231511882
image-20241019231557339
image-20241019231719863
image-20241019231946589
image-20241019232134511
image-20241019232227677
image-20241019232248704
image-20241019232541099
image-20241019233023494
image-20241019233006311

应用层代理技术

公网单代理配置

image-20241020145607624
image-20241020150003380
image-20241020150132265
image-20241020150518439
image-20241020150658784

公网代理池设置

image-20241020165105160
image-20241020165456193

SSTAP工具使用

image-20241020163534056
image-20241020163623432
image-20241020164035958
image-20241020164320125
image-20241020164521770
image-20241020164606008
image-20241020164748961

应用层内网代理

内网代理介绍

image-20241020200204843

image-20241020200338942
image-20241020200419296
image-20241020200453401

ew介绍

EW一级正向代理

image-20241020205359398
image-20241020205520499
image-20241020205537781
image-20241020205623400
image-20241020210414692
image-20241020210503528

EW一级反向代理

image-20241020230337325
image-20241020230657626
image-20241020230807692
image-20241020231237479
image-20241020231332996

EW二级正向代理

image-20241020234635649
image-20241020234947186
image-20241021000348073
image-20241020235131520

EW二级反向代理

image-20241021003304659
image-20241021003534066
image-20241021003926823
image-20241021004008126
image-20241020235131520

NPS和FRP的使用

FRP点对点转发

image-20241021192049624
image-20241021192249699
image-20241021193622774
image-20241021192207494
image-20241021193703231

FRP搭建socks代理

image-20241021200604074
image-20241021200731408
image-20241021200903134
image-20241021201113551
image-20241021201225450
image-20241021201352932

FRP搭建多级代理

image-20241021203929442
image-20241021204157302
image-20241021204236918
image-20241021204305720
image-20241021204415935
image-20241021204438868
image-20241021204604578
image-20241021204916092
image-20241021205055380
image-20241021205125848
image-20241021205407170

NPS的介绍和使用

image-20241021221906030
image-20241021221931917
image-20241021222013746
image-20241021222028826
image-20241021222059521
image-20241021222151501
image-20241021222306491
image-20241021222417894
image-20241021205125848

上线不出网机器方式

SMB beacon上线

image-20241022112248598
image-20241022112638986
image-20241022112756744
image-20241022112829516
image-20241022112901566
image-20241022113027495
image-20241022114017004
image-20241022114049496

TCP Beacon

image-20241022122443160
image-20241022122521260
image-20241022122619681
image-20241022122649927
image-20241022122747243
image-20241022123051586
image-20241022123119553
image-20241022123534204

HTTP 代理上线

image-20241022141119574
image-20241022142012878
image-20241022143634970
image-20241022144737776
image-20241022144847024
image-20241022145250320

中转上线

image-20241022152351540
image-20241022152524501
image-20241022152646187
image-20241022152821727
image-20241022153009625

DNS和ICMP隧道

ICMP实现反弹shell

image-20241022231858801
image-20241022233113442
image-20241022234741689
image-20241022234829294
image-20241022234914311

ICMP实现隧道上线CS

image-20241023124254059
image-20241023124413398
image-20241023124535657
image-20241023125043991
image-20241023125212126

Last updated