blob: f3b8e0082f936ce7c93c0bbc87dfc02576cd3ac0 (
plain) (
tree)
|
|
PORT 1080
nmap detected a socks5 proxy on this port. I did a bit of reading into socks5 and proxies in general as I didn't have a lot of experience actually using them.
The basic idea of socks5 is that any traffic we send to this port will be sent back out from the perspective of the machine hosting the proxy (our target in this case). This means we can see things from behind any firewalls or on other networks that the target has access to.
The easiest way to use the proxy was with proxychains.
In /etc/proxychains.conf
add the line
socks5 172.15.18.117 1080
then we can scan the target localhost from the other side of the its firewall
proxychains nmap -A -p- 127.0.0.1
The scan results are in target_scan_local_through_proxy.txt
we can see ssh on 22, the socks5 on 1080 that we used to get here, and a web server on 8000
proxychains wget http://127.0.0.1:8000
gets us a webpage with the flag
|