Fast Track Yourself to Break Into Cyber Security: elevatecybersecurity.net/9f2j
@JK-pb3vj2 жыл бұрын
Bruh. You legit saved my ass the day before the PWK exam - nothing was working and this solved it all. You are the goat!
@elevatecyber50312 жыл бұрын
Lol. Good to hear!
@raveturk37117 ай бұрын
Finally i understand pivoting. Sir, thank you so much. This video explains it crystal clear.
@iCyberVenom Жыл бұрын
This video......is PHENOMENAL! It truly blows my mind that PWK 2022 and 2023 don't provide an in-depth review of chisel considering it's one of the most popular tools for pivoting and practically required knowledge for both the labs and exam. Instead, they REALLY dug deep into SSH tunneling which has it's place, but isn't nearly as versatile. I'm working through PWK 2023 labs right now, and I finally realized nowhere in the course is chisel covered like it should be. There's a single example provided that includes a web server exploit, but there are several other elements involved with the explanation, which left me a bit under-prepared for the labs. Because of your video, I finally fully understand how to effectively pivot with chisel. THANK YOU!🕶
@MichalMati Жыл бұрын
Chisel IS covered by the PWK material.
@buII3tpr00f Жыл бұрын
I did a pivoting like this and verified that port 80 is open on the target machine. Then I could not access the website running on port 80 using a browser. How can I do this?
@MygenteTV Жыл бұрын
@@buII3tpr00fyou will need to jump to the machine and then from that machine do the same. This way you will have access to port 80. Because here you are only having access to see the box from the first box, but it doesn't mean that box have access to port 80 in that box. The only way you can know this is by login to the first box using RDP. Now open the browser and try to visiting the second box ip:80
@TylerRamsbey2 жыл бұрын
Oh man. So much better than the way OSCP teaches it. Thank you!
@elevatecyber50312 жыл бұрын
Glad to hear this!
@supersteve6772 Жыл бұрын
I trust Tyler. When he says this is better instruction than the oscp, I listen.
@TylerRamsbey Жыл бұрын
@@supersteve6772 Ha! Thank you friend!
@mikedunn330 Жыл бұрын
Thank you! I've been advised to use this on the exam but I needed to learn how to use it.
@sp4rtavus2442 жыл бұрын
You have a very good way of presenting and explaining.
@kennystrawnmusicАй бұрын
The OSCP course material may not teach this but the CPTS material definitely does.
@Tathamet Жыл бұрын
Golden content as all ways cheers bro
@0xf0x Жыл бұрын
Excellent video, exactly what I was looking for and explained super clearly
@c4lex4332 жыл бұрын
Much appreciated for this awesome Pivoting technique! Thank you
@0xrohit542 жыл бұрын
Awesome Techniuqe for pivoting sir specially that sock5 mehod..thank you sir🔥🔥🔥🔥
@colinrogers9927 Жыл бұрын
Great video. Thank you for sharing with us.
@kadenhawley43682 жыл бұрын
This is sweet! Thanks for the video
@christopherthomas9047 Жыл бұрын
Thx for this vid!! Awesome demo.
@dustinhxc Жыл бұрын
Amazing video 🎉
@AnnFranksUrn3 ай бұрын
Another even better tool that offers simplicity is sshuttle
@jonridpath13492 жыл бұрын
Lovin me some chisel and crackmap exec thanks for your content- very excited to get into the weeds on this tool!!
@arshdeeprobin15258 ай бұрын
Love you ❤
@plushplush76352 жыл бұрын
chisel is awesome, with ssh i use sshuttle for pivoting
@abudi452 жыл бұрын
Good presentation appriciate good job keep going... 👍👏
@elevatecyber50312 жыл бұрын
Thanks!
@blackhatvisions Жыл бұрын
I was thinking that this is not secure because it is using normal tcp/udp socks over HTTP. But then i realized it's actually doing SSH over the HTTP protocol, which provides the benefits of SSH encryption
@Strivingtolearn6009 Жыл бұрын
there is a flaw with using chisel. ive had situations before when using chisel where chisel was too slow to enumerate effectively ie nmap scanning
@retr0.133710 ай бұрын
Where is the flaw? The only flaw i see is liking your own comment.
@presequel Жыл бұрын
fantastic video, thx!
@lezlydialidceronrodriguez1752 Жыл бұрын
Thank you! 💟
@Zachsnotboard7 ай бұрын
If you are in the DMZ how would you enumerate internal IPs to tunnel to ? Minus the dual home situation, or is that common ? Sorry just confused how common pivoting from DMZ to internal is IRL
@akashpandey64702 жыл бұрын
Nice... Really appreciated
@liltoxicpain11 ай бұрын
Just a question, why if we start a chisel server on port 8080 we have to put a socks5 on port 1080 in our proxychain? and not 8080? ( by the way thank you really much for this video that was really helpfull to me :) )
@ontoshere Жыл бұрын
Hey I love this! I was wondering, say you are behind NAT so your compromised machine can't call back. How could I go about this with chisel or even ssh? I'm not finding much online (maybe I'm just not searching something correctly?) so for now, I've settled with using metasploit bind meterpreter shells and autoroute. Then set up the proxy there. I really want a full on pivot like this though without meterpreter just for the sake of it. I'm sure I'm just missing something, but I really am not grasping how it's done. I tried a ssh -D with an ssh connection, but I'm fairly certain I did that wrong. But chisel obviously can't reach my IP due to the NAT. Thanks!
@itsm3dud39 Жыл бұрын
how to use chisel on multiple internal machines??
@liquidrope706311 ай бұрын
Offsec has been teaching people to use chisel for a while now
@elevatecyber503111 ай бұрын
Oh nice. They didn't back during the time that video was recorded
@liquidrope706311 ай бұрын
yeah, I believe they started when they released the 2023 version of their course@@elevatecyber5031
@OhDearBabajan Жыл бұрын
Under what circumstances would chisel not work? What if certain ports like 22 and 80 on the target are closed outbound?
@the_terrorizer Жыл бұрын
It doesn’t matter, you can specify the port. The only time it wouldn’t work would be like if you couldn’t execute or transfer executable files or something like that.
@hottestnews1679 Жыл бұрын
u jsut got another subsciber
@kingofthesummer5180 Жыл бұрын
Did you need the proxychains command for this ? I’m asking because of the speed concern. My internet is already slow
Thanks for this great and informative content but I have a question. I did a pivoting like this and verified that port 80 is open on the target machine. Then I could not access the website running on port 80 using a browser. How can I do this?
@kevinkehoe995010 ай бұрын
You could use Foxy Proxy and setup the proxy to access the webserver on your browser
@elprquex2 жыл бұрын
Hi. can you tell me if windows antivirus is disabled and what conditions? Thank you.
@younesmohssen81582 жыл бұрын
Sickkk video! I loved it. I didn’t understand however how you initiated a server on port 8000 and then used proxychains port 1080 for the forwarding. Why don’t we put proxychains port as 8000, just like the server and the client ? Anything I’m missing?
@younesmohssen81582 жыл бұрын
Nvm got it. R:socks defaults to 1080 if anyone else is wondering.
@odilonthibauttchouadjengue61492 жыл бұрын
Hi, how would you find the ip of the DC (.100) which is connected to that network? since from the ipconfig of the remote machine you have access through code exec the ip shown is .10
@elevatecyber50312 жыл бұрын
There are a number of ways. Personally, I would just use nmap to scan the subnet to find all servers. Then I'd run a 2nd nmap scan against all ips from the first scan, scanning for TCP port 88 (Kerberos), which is likely to be only open on a domain controller.
@CWLabs72092 жыл бұрын
Thanks :)
@AllenGamingYT2 жыл бұрын
how would you prtfwd with chisel? can you make video?
@elevatecyber50312 жыл бұрын
Sure!
@stuarthook62262 жыл бұрын
How to replicate this environment , can you point to any VM setup?
@elevatecyber50312 жыл бұрын
I can make a video showing how. It's some simple VMWare settings. Haven't tried it with Virtual Box but I'm sure it would be similar
@TheBigJohny Жыл бұрын
I think this tool is already in kali linux as of now
@SavageScientist Жыл бұрын
This is why OSCP is the foundation of hacking knowledge. Don't waste time on bullshit like CEH pay for pwk and once you get your foundation then you can move on to more advanced or alternative techniques like this.
@ReligionAndMaterialismDebunked Жыл бұрын
:3 This ethical hacker has a really nice place! Haha :3 🤓🧺🔥🤝😎