πSocksOverRDP
π Module Overview
1. Introduction to SocksOverRDP
What is SocksOverRDP?
Dynamic Virtual Channels (DVC)
How SocksOverRDP Works
SocksOverRDP vs Other Windows Pivoting
2. Tool Requirements and Setup
Required Components
SocksOverRDP Components
Download URLs
File Preparation
Download and Extract
File Transfer Methods
3. Architecture Overview
Network Topology
Traffic Flow
Component Interaction
4. Implementation Steps
Step 1: Prepare Attack Host
Step 2: Connect to Windows Pivot Host
Step 3: Disable Windows Defender
Step 4: Transfer Files to Pivot Host
Step 5: Register SocksOverRDP Plugin
5. Establishing RDP Tunnel Chain
Step 6: RDP to Domain Controller
Step 7: Transfer Server to DC
Step 8: Start SocksOverRDP Server
Step 9: Verify SOCKS Listener
6. Proxifier Configuration
Step 10: Launch Proxifier
Step 11: Configure SOCKS Proxy
Step 12: Configure Proxification Rules
7. HTB Academy Lab Exercise
Lab Challenge
Lab Environment
Complete Lab Solution
Phase 1: Setup and Initial Connection
Phase 2: Pivot Host Configuration
Phase 3: Domain Controller Connection
Phase 4: Proxifier Setup
Phase 5: Final Target Access
Lab Solution Summary
8. Troubleshooting Common Issues
DLL Registration Failures
RDP Connection Issues
SOCKS Proxy Issues
Proxifier Configuration Issues
Windows Defender Interference
9. Performance Optimization
RDP Performance Settings
Proxifier Performance
Network Optimization
10. Security Considerations
OPSEC Implications
Detection Evasion
Cleanup Procedures
11. Alternative Windows Pivoting Methods
Comparison with Other Techniques
When to Use SocksOverRDP
Limitations
12. Integration with Other Tools
Metasploit Integration
Nmap Through RDP Tunnel
Web Browser Pivoting
References
Last updated