jpillora / chisel

A fast TCP/UDP tunnel over HTTP
MIT License
13.62k stars 1.4k forks source link

Chisel over RDP Session #380

Open sp00ks-git opened 2 years ago

sp00ks-git commented 2 years ago

Goal To route traffic from a remote network (172.10.10.x) to my local Linux box. The windows 10 mahcine has a vpn established that gains access to the 172 network.

Constraints I can only access the Jump Server via rdp on port 3389 I only have user level access to the jump server.

Setup Debian Linux ( Full Access) -> 192.168.1.122 Windows 10 (Full Access) -> 192.168.1.94 -> Jump Server 172.10.10.1 (user only access, no local admin) -> 172.10.10.x Network Connecting using SOCKS5

Linux Box ./chisel_1.7.7_linux_amd64 server -p 8080 --reverse ./chisel_1.7.7_linux_amd64 client 127.0.0.1:8081 socks (proxychains.conf) socks5 127.0.0.1 1080

Win10 chisel.exe client 192.168.1.122:8080 R:8081:127.0.0.1:9001 chisel.exe server -p 9001 --socks5

So currently If i test if i can see port 3389 open from the Linux box to the windows 10 machine this works, if i use a full TCP and no ping scan - which is a great start.

proxychains4 nmap 172.10.10.1 -sT -p 3389 -Pn [proxychains] Strict chain ... 127.0.0.1:1080 ... 172.10.10.1:3389 ... OK

Host is up (0.017s latency).

PORT STATE SERVICE
3389/tcp open ms-wbt-server?

So my question is, can chisel let me see the network behind the Jump Server and if so what would i need to run on the jump server to chain or link the connection back? Presumably i can do this over tcp as i have port 3389 open?

Im new so a spoon fed command would be appreciated if possible :-)

jpillora commented 2 years ago

Constraints I can only access the Jump Server via rdp on port 3389 I only have user level access to the jump server.

If you can kill/move the RDP server, then you could run chisel on 3389 in its place - though without root access, outside of using RDP itself, or finding a vuln in RDP, i dont think there is anything you can do