# 1080 - Pentesting Socks {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} ## Basic Information **SOCKS** je protokol koji se koristi za prenos podataka između klijenta i servera putem proksija. Peta verzija, **SOCKS5**, dodaje opcionalnu funkciju autentifikacije, omogućavajući samo ovlašćenim korisnicima pristup serveru. Primarno se bavi proksiranjem TCP veza i prosleđivanjem UDP paketa, delujući na sloju sesije (Sloj 5) OSI modela. **Podrazumevani port:** 1080 ## Enumeration ### Authentication Check ```bash nmap -p 1080 --script socks-auth-info ``` ### Brute Force #### Osnovna upotreba ```bash nmap --script socks-brute -p 1080 ``` #### Napredna upotreba ```bash nmap --script socks-brute --script-args userdb=users.txt,passdb=rockyou.txt,unpwdb.timelimit=30m -p 1080 ``` #### Izlaz ``` PORT STATE SERVICE 1080/tcp open socks | socks-brute: | Accounts | patrik:12345 - Valid credentials | Statistics |_ Performed 1921 guesses in 6 seconds, average tps: 320 ``` ## Tunneling and Port Forwarding ### Osnovna upotreba proxychains Podesite proxy lance da koristite socks proxy ``` nano /etc/proxychains4.conf ``` Editujte dno i dodajte svoj proxy ``` socks5 10.10.10.10 1080 ``` Sa autentifikacijom ``` socks5 10.10.10.10 1080 username password ``` #### Više informacija: [Tunneling and Port Forwarding](../generic-methodologies-and-resources/tunneling-and-port-forwarding.md) {% hint style="success" %} Učite i vežbajte AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Učite i vežbajte GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Podržite HackTricks * Proverite [**planove pretplate**](https://github.com/sponsors/carlospolop)! * **Pridružite se** 💬 [**Discord grupi**](https://discord.gg/hRep4RUj7f) ili [**telegram grupi**](https://t.me/peass) ili **pratite** nas na **Twitteru** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Podelite hakerske trikove slanjem PR-ova na** [**HackTricks**](https://github.com/carlospolop/hacktricks) i [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repozitorijume.
{% endhint %}