Skip to content

HTTP Tunneling

lethanhtung01011980 edited this page Dec 23, 2019 · 2 revisions

Goals

  • Victim to use HTTP proxy to connect to TCP targets.
  • Once the connection with the server has been established, the proxy server continues to proxy the TCP stream to and from the client.
  • Payload is store in HTTP GET / POST request

Sample

  • Coonect to local proxy: nc -vvn local-proxy 8888
  • Ask the proxy to connect to other server: CONNECT other-target:80 HTTP/1.0

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally