Skip to content

Commit d1bf7d9

Browse files
committed
auxilary/server/socks4a documentation
1 parent e05cac1 commit d1bf7d9

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed
Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,26 @@
1-
21
## Verification Steps
32

4-
1. Start msfconsole
5-
2. Do: ```use auxiliary/server/socks4a```
6-
3. Do: ```run```
7-
4. Do: ```curl --proxy socks4a://localhost:1080 https://github.com```
8-
5. You should see the source for the github homepage
3+
1. Start `msfconsole`
4+
2. Do: `use auxiliary/server/socks4a`
5+
3. Do: `run`
6+
4. Do: `curl --proxy socks4a://localhost:1080 https://github.com`
7+
5. You should see the source for the Github homepage
98

109
## Options
1110

1211
**SRVHOST**
1312

14-
The local IP address to bind the proxy to. The default value of `0.0.0.0` will expose the proxy to everything on the attackers network.
13+
The local IP address to bind the proxy to. The default value of `0.0.0.0` will expose the proxy to everything on the attacker's network.
1514

1615
**SRVPORT**
1716

18-
The local port to bind the proxy to. The default value is `1080`, the standard port for a SOCKS4a proxy.
17+
The local port to bind the proxy to. The default value is `1080`, the standard port for a socks4a proxy.
1918

2019
## Scenarios
2120

2221
This module is great when pivoting across a network. Suppose we have two machines:
2322

24-
1. Attackers machine, on the `192.168.1.0/24` subnet.
23+
1. Attacker's machine, on the `192.168.1.0/24` subnet.
2524
2. Victim machine with two network interfaces, one attached to the `192.168.1.0/24` subnet and the other attached to the non-routable `10.0.0.0/24` subnet.
2625

2726
We'll begin by starting the socks4a proxy:
@@ -33,28 +32,29 @@
3332
msf auxiliary(socks4a) >
3433
```
3534

36-
Preparing to pivot across a network requires us to first establish a meterpreter session on the victim machine. From there, we can use the `autoroute` module to enable access to the non-routable subnet:
35+
Preparing to pivot across a network requires us to first establish a Meterpreter session on the victim machine. From there, we can use the `autoroute` script to enable access to the non-routable subnet:
3736

3837
```
39-
meterpreter > run autoroute -s 10.0.0.0/24;
38+
meterpreter > run autoroute -s 10.0.0.0/24
4039
```
4140

42-
The `autoroute` module will enable our local socks4a proxy to direct all traffic to the `10.0.0.0/24` subnet through our meterpreter session causing it to emerge from the victim's machine and thus giving us access to the non-routable subnet. We can now use curl to connect to a machine on the non-routable subnet via the socks4a proxy:
41+
The `autoroute` module will enable our local socks4a proxy to direct all traffic to the `10.0.0.0/24` subnet through our Meterpreter session, causing it to emerge from the victim's machine and thus giving us access to the non-routable subnet. We can now use `curl` to connect to a machine on the non-routable subnet via the socks4a proxy:
4342
```
4443
curl --proxy socks4a://localhost:1080 http://10.0.0.15:8080/robots.txt
4544
```
4645

47-
We can take this a step further and use `proxychains` to enable other tools to access the non-routable subnet that don't have built-in support for proxies. The short-and-sweet guide to installing and configuring proxychains looks something like this:
46+
We can take this a step further and use proxychains to enable other tools that don't have built-in support for proxies to access the non-routable subnet. The short-and-sweet guide to installing and configuring proxychains looks something like this:
4847

4948
```
5049
# apt-get install proxychains
50+
# cp /etc/proxychains.conf /etc/proxychains.conf.backup
5151
# echo "socks4 127.0.0.1 8080" > /etc/proxychains.conf
5252
```
5353

54-
From there, we can use our other tools by simply prefixing them with proxychains:
54+
From there, we can use our other tools by simply prefixing them with `proxychains`:
5555

5656
```
5757
# proxychains curl http://10.0.0.15:8080/robots.txt
58-
# proxychains nmap -sSV -p 22 10.0.0.15
58+
# proxychains nmap -sT -Pn -n -p 22 10.0.0.15
5959
# proxychains firefox
6060
```

0 commit comments

Comments
 (0)