β‘Chisel SOCKS5 Tunneling
π Module Overview
1. Introduction to Chisel
What is Chisel?
How Chisel Works
[Attack Host] βHTTP/SSHβ [Pivot Host] βInternalβ [Target Network]
Chisel Client Chisel Server 172.16.5.0/23
SOCKS5 Proxy Port Forward Domain Controller
127.0.0.1:1080 Network Bridge 172.16.5.19Chisel vs Other Tunneling Tools
2. Installation and Setup
Method 1: Pre-built Binaries (Recommended)
Download Specific Version (HTB Academy Compatible)
Download Latest Version
Method 2: Build from Source
Prerequisites
Clone and Build
Cross-compilation for Different Platforms
Binary Size Optimization
3. Normal Mode - Server on Pivot Host
Architecture Overview
Step 1: Transfer Binary to Pivot Host
Step 2: Start Server on Pivot Host
Step 3: Connect Client from Attack Host
Step 4: Configure Proxychains
Step 5: Use Tunnel for RDP
4. Reverse Mode - Server on Attack Host
When to Use Reverse Mode
Architecture Overview
Step 1: Start Reverse Server on Attack Host
Step 2: Connect Reverse Client from Pivot Host
Step 3: Configure Proxychains (Same as Normal Mode)
5. HTB Academy Lab Exercise
Lab Challenge
Lab Environment
Complete Lab Solution
Step 1: Download Chisel v1.7.6
Step 2: Transfer to Pivot Host
Step 3: SSH to Pivot Host
Step 4: Start Chisel Server on Pivot
Step 5: Connect Client from Attack Host
Step 6: Configure Proxychains
Step 7: RDP to Domain Controller
Step 8: Retrieve Flag
Lab Solution Summary
6. Advanced Chisel Techniques
Port Forwarding (Local)
Port Forwarding (Remote)
Multiple Tunnels
HTTP Proxy Mode
7. Troubleshooting
Common Issues
Version Compatibility
Connection Issues
SOCKS Version Mismatch (COMMON)
SOCKS Proxy Not Working
Binary Transfer Issues
Performance Optimization
8. Operational Security (OPSEC)
Stealth Considerations
Detection Evasion
Cleanup Commands
9. Integration with Other Tools
Metasploit Integration
Nmap through Tunnel
Web Application Testing
10. Alternative Tools Comparison
Chisel vs Similar Tools
When to Choose Chisel
References
Last updated