SSF
Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform.
Last updated
Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform.
Last updated
Source 1: https://github.com/securesocketfunneling/ssf
Source 2: https://securesocketfunneling.github.io/ssf/#home
Opening a server on the Attacker machine.
The (-l) is the IP of the attacker - without this flag it will listen on 0.0.0.0
The default port (-p) is 8011
-D: the attacker (server) will act as the SOCKS server
-F: the target (client) will act as the SOCKS server
./ssfcp can copy files through the tunnel
-X: client opens a listening socket on the given port (10000)
-Y: client orders the server to open a listening socket on the given port (11000)
We can use just one of the options if we want:
The -X let us open a shell of the attacker on the target machine
The -Y let us open a shell of the target on our attacker machine
Use this options for Linux, Windows respectively to disable local echo:
To use copy and shell options, you need to specify the config.json accordingly: