Offensive Tor Toolkit
  • Introduction
  • TL;DR
  • Toolkit Overview
    • Download
    • reverse-shell-over-tor
    • hidden-bind-shell
    • hidden-portforwarding
    • tcp2tor-proxy
  • PoC - Proof Of Concept
    • Overview
    • Gaining access with reverse-shell-over-tor
    • Multi-shell access with hidden-bind-shell
    • Pivoting with hidden-portforwarding and Chisel
    • Remote port forwarding with tcp2tor-proxy
Powered by GitBook
On this page

Was this helpful?

  1. Toolkit Overview

tcp2tor-proxy

Victim allows another victim to access a Hidden Service through it. Useful to gaining access to victims in isolated networks.

This tool allows the victim to set up a service that forwards TCP traffic to a Hidden Service. Then, an victim inside an internal network can access a Hidden Service pivoting over the victim that executes this tool.

Some parameters need to be set:

$ ./tcp2tor-proxy -h
Usage of tcp2tor-proxy:

  -listen string
        TCP Socket to listen on. Format: [<IP>]:<PORT> (default "127.0.0.1:60101")
  -onion-forward string
        Hidden service to proxy. Format: <ONION>:<PORT>. This parameter is required
  -timeout int
        Timeout in seconds for Tor setup (default 180)
Previoushidden-portforwardingNextOverview

Last updated 3 years ago

Was this helpful?