mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-19 01:24:50 +00:00
115 lines
4.3 KiB
Markdown
115 lines
4.3 KiB
Markdown
|
# Expose local to the internet
|
||
|
|
||
|
{% hint style="success" %}
|
||
|
Learn & practice AWS Hacking:<img src="../../.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../../.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
|
Learn & practice GCP Hacking: <img src="../../.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="../../.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary>Support HackTricks</summary>
|
||
|
|
||
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
||
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.**
|
||
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
||
|
|
||
|
</details>
|
||
|
{% endhint %}
|
||
|
|
||
|
**The goal of this page is to propose alternatives that allow AT LEAST to expose local raw TCP ports and local webs (HTTP) to the internet WITHOUT needing to install anything in the other server (only in local if needed).**
|
||
|
|
||
|
## **Serveo**
|
||
|
|
||
|
From [https://serveo.net/](https://serveo.net/), it allows several http and port forwarding features **for free**.
|
||
|
|
||
|
```bash
|
||
|
# Get a random port from serveo.net to expose local port 4444
|
||
|
ssh -R 0:localhost:4444 serveo.net
|
||
|
|
||
|
# Expose a web listening in localhost:300 in a random https URL
|
||
|
ssh -R 80:localhost:3000 serveo.net
|
||
|
```
|
||
|
|
||
|
## SocketXP
|
||
|
|
||
|
From [https://www.socketxp.com/download](https://www.socketxp.com/download), it allows to expose tcp and http:
|
||
|
|
||
|
```bash
|
||
|
# Expose tcp port 22
|
||
|
socketxp connect tcp://localhost:22
|
||
|
|
||
|
# Expose http port 8080
|
||
|
socketxp connect http://localhost:8080
|
||
|
```
|
||
|
|
||
|
## Ngrok
|
||
|
|
||
|
From [https://ngrok.com/](https://ngrok.com/), it allows to expose http and tcp ports:
|
||
|
|
||
|
```bash
|
||
|
# Expose web in 3000
|
||
|
ngrok http 8000
|
||
|
|
||
|
# Expose port in 9000 (it requires a credit card, but you won't be charged)
|
||
|
ngrok tcp 9000
|
||
|
```
|
||
|
|
||
|
## Telebit
|
||
|
|
||
|
From [https://telebit.cloud/](https://telebit.cloud/) it allows to expose http and tcp ports:
|
||
|
|
||
|
```bash
|
||
|
# Expose web in 3000
|
||
|
/Users/username/Applications/telebit/bin/telebit http 3000
|
||
|
|
||
|
# Expose port in 9000
|
||
|
/Users/username/Applications/telebit/bin/telebit tcp 9000
|
||
|
```
|
||
|
|
||
|
## LocalXpose
|
||
|
|
||
|
From [https://localxpose.io/](https://localxpose.io/), it allows several http and port forwarding features **for free**.
|
||
|
|
||
|
```bash
|
||
|
# Expose web in port 8989
|
||
|
loclx tunnel http -t 8989
|
||
|
|
||
|
# Expose tcp port in 4545 (requires pro)
|
||
|
loclx tunnel tcp --port 4545
|
||
|
```
|
||
|
|
||
|
## Expose
|
||
|
|
||
|
From [https://expose.dev/](https://expose.dev/) it allows to expose http and tcp ports:
|
||
|
|
||
|
```bash
|
||
|
# Expose web in 3000
|
||
|
./expose share http://localhost:3000
|
||
|
|
||
|
# Expose tcp port in port 4444 (REQUIRES PREMIUM)
|
||
|
./expose share-port 4444
|
||
|
```
|
||
|
|
||
|
## Localtunnel
|
||
|
|
||
|
From [https://github.com/localtunnel/localtunnel](https://github.com/localtunnel/localtunnel) it allows to expose http for free:
|
||
|
|
||
|
```bash
|
||
|
# Expose web in port 8000
|
||
|
npx localtunnel --port 8000
|
||
|
```
|
||
|
|
||
|
{% hint style="success" %}
|
||
|
Learn & practice AWS Hacking:<img src="../../.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../../.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
|
Learn & practice GCP Hacking: <img src="../../.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="../../.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary>Support HackTricks</summary>
|
||
|
|
||
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
||
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.**
|
||
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
||
|
|
||
|
</details>
|
||
|
{% endhint %}
|