Description: How to use rssocks and rcsocks from ssocks project (http://sourceforge.net/projects/ssocks/).
During this video I explain how from a shell I run a socks5 server with a reverse connection to bypass firewall restriction and scan the subnet using rssocks and rcsocks.
For remember:
- rssocks is the server is connect back to your client (need to be execute on the remote shell)
- rcsocks is the client you run it
PS: The reverse tools of ssocks are actually a POC, some improvements will arrive soon
Current version during this video v0.0.9
Tags: ssocks , rssocks , rcsocks , reverse connection , socks5 , security , pentest ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
this is very similar to the pivoting feature in metasploit (route) and I'm already thinking of ways that this could be useful. Thank you for posting!
Yes. Like when the shellcode window is astronomically small and all you could possibly do is pop a shell...or various other scenarios where delivering the meterpreter payload is impractical or not available(LFI, etc with no compiler on the local box...)