mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 22:18:27 +00:00
81 lines
3.6 KiB
Markdown
81 lines
3.6 KiB
Markdown
# 1080 - Pentesting Socks
|
|
|
|
{% hint style="success" %}
|
|
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|
|
|
<details>
|
|
|
|
<summary>Support HackTricks</summary>
|
|
|
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
|
|
|
</details>
|
|
{% endhint %}
|
|
|
|
## Información Básica
|
|
|
|
**SOCKS** es un protocolo utilizado para transferir datos entre un cliente y un servidor a través de un proxy. La quinta versión, **SOCKS5**, agrega una función de autenticación opcional, permitiendo que solo los usuarios autorizados accedan al servidor. Principalmente maneja el proxy de conexiones TCP y el reenvío de paquetes UDP, operando en la capa de sesión (Capa 5) del modelo OSI.
|
|
|
|
**Puerto por Defecto:** 1080
|
|
|
|
## Enumeración
|
|
|
|
### Verificación de Autenticación
|
|
```bash
|
|
nmap -p 1080 <ip> --script socks-auth-info
|
|
```
|
|
### Fuerza Bruta
|
|
|
|
#### Uso básico
|
|
```bash
|
|
nmap --script socks-brute -p 1080 <ip>
|
|
```
|
|
#### Uso avanzado
|
|
```bash
|
|
nmap --script socks-brute --script-args userdb=users.txt,passdb=rockyou.txt,unpwdb.timelimit=30m -p 1080 <ip>
|
|
```
|
|
#### Salida
|
|
```
|
|
PORT STATE SERVICE
|
|
1080/tcp open socks
|
|
| socks-brute:
|
|
| Accounts
|
|
| patrik:12345 - Valid credentials
|
|
| Statistics
|
|
|_ Performed 1921 guesses in 6 seconds, average tps: 320
|
|
```
|
|
## Túneles y Reenvío de Puertos
|
|
|
|
### Uso básico de proxychains
|
|
|
|
Configura proxychains para usar un proxy socks
|
|
```
|
|
nano /etc/proxychains4.conf
|
|
```
|
|
Edita la parte inferior y añade tu proxy
|
|
```
|
|
socks5 10.10.10.10 1080
|
|
```
|
|
Con autenticación
|
|
```
|
|
socks5 10.10.10.10 1080 username password
|
|
```
|
|
#### Más información: [Tunneling and Port Forwarding](../generic-methodologies-and-resources/tunneling-and-port-forwarding.md)
|
|
|
|
{% hint style="success" %}
|
|
Aprende y practica Hacking en AWS:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
Aprende y practica Hacking en GCP: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|
|
|
<details>
|
|
|
|
<summary>Apoya a HackTricks</summary>
|
|
|
|
* Revisa los [**planes de suscripción**](https://github.com/sponsors/carlospolop)!
|
|
* **Únete al** 💬 [**grupo de Discord**](https://discord.gg/hRep4RUj7f) o al [**grupo de telegram**](https://t.me/peass) o **síguenos** en **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Comparte trucos de hacking enviando PRs a los** [**HackTricks**](https://github.com/carlospolop/hacktricks) y [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repositorios de github.
|
|
|
|
</details>
|
|
{% endhint %}
|