Linux Tools
proxychains
is a tool which acts as a wrapper around other applications to tunnel their traffic over a socks proxy. First, we need to modify its configuration file to point to our Cobalt Strike socks proxy.
\
At the bottom of the file, you will see a default entry for SOCKS4: socks4 127.0.0.1 9050
. We need to change this to match the settings of the proxy we started.
SOCKS4:
socks4 127.0.0.1 1080
.SOCKS5:
socks5 127.0.0.1 1080 socks_user socks_password
.
To tunnel a tool through proxychains, it's as simple as proxychains [tool] [tool args]
. So to tunnel nmap
, it would be:
\
There are some restrictions on the type of traffic that can be tunnelled, so you must make adjustments with your tools as necessary. ICMP and SYN scans cannot be tunnelled, so we must disable ping discovery (-Pn
) and specify TCP scans (-sT
) for this to work.
You can also run tools from inside WSL on Windows.
Last updated