From d4742a96888fe2fdac44351d8f353281bd06b9d7 Mon Sep 17 00:00:00 2001 From: Swissky <12152583+swisskyrepo@users.noreply.github.com> Date: Thu, 5 Jan 2023 01:50:11 +0100 Subject: [PATCH] SOCKS Compatibility Table + CORS --- CORS Misconfiguration/README.md | 1 + Methodology and Resources/Active Directory Attack.md | 1 + .../Network Pivoting Techniques.md | 11 +++++++++++ 3 files changed, 13 insertions(+) diff --git a/CORS Misconfiguration/README.md b/CORS Misconfiguration/README.md index 9a1186c..a679999 100644 --- a/CORS Misconfiguration/README.md +++ b/CORS Misconfiguration/README.md @@ -14,6 +14,7 @@ * [s0md3v/Corsy - CORS Misconfiguration Scanner](https://github.com/s0md3v/Corsy/) * [chenjj/CORScanner - Fast CORS misconfiguration vulnerabilities scanner](https://github.com/chenjj/CORScanner) * [PostMessage POC Builder - @honoki](https://tools.honoki.net/postmessage.html) +* [trufflesecurity/of-cors - Exploit CORS misconfigurations on the internal networks](https://github.com/trufflesecurity/of-cors) ## Prerequisites diff --git a/Methodology and Resources/Active Directory Attack.md b/Methodology and Resources/Active Directory Attack.md index a1f1f24..f3d8eba 100644 --- a/Methodology and Resources/Active Directory Attack.md +++ b/Methodology and Resources/Active Directory Attack.md @@ -2133,6 +2133,7 @@ If a machine has `SMB signing`:`disabled`, it is possible to use Responder with MSSQL 192.168.48.230 CONTOSO/NORMALUSER1 1433 # You might need to select a target with "-t" + # smb://, mssql://, http://, https://, imap://, imaps://, ldap://, ldaps:// and smtp:// impacket-ntlmrelayx -t mssql://10.10.10.10 -socks -smb2support impacket-ntlmrelayx -t smb://10.10.10.10 -socks -smb2support diff --git a/Methodology and Resources/Network Pivoting Techniques.md b/Methodology and Resources/Network Pivoting Techniques.md index 48b3358..11669b6 100644 --- a/Methodology and Resources/Network Pivoting Techniques.md +++ b/Methodology and Resources/Network Pivoting Techniques.md @@ -2,6 +2,7 @@ ## Summary +* [SOCKS Compatibility Table](#socks-compatibility-table) * [Windows netsh Port Forwarding](#windows-netsh-port-forwarding) * [SSH](#ssh) * [SOCKS Proxy](#socks-proxy) @@ -27,6 +28,16 @@ * [Connect - Connect](#connect---connect) * [References](#references) + +## SOCKS Compatibility Table + +| SOCKS Version | TCP | UDP | IPv4 | IPv6 | Hostname | +| ------------- | :---: | :---: | :---: | :---: | :---: | +| SOCKS v4 | ✅ | ❌ | ✅ | ❌ | ❌ | +| SOCKS v4a | ✅ | ❌ | ✅ | ❌ | ✅ | +| SOCKS v5 | ✅ | ✅ | ✅ | ✅ | ✅ | + + ## Windows netsh Port Forwarding ```powershell