Socks - Port 1080
Basic info
SOCKS Proxy Fundamentals and Protocol Behavior
Enumeration of SOCKS Proxies
Identifying Open SOCKS Proxies
Detecting SOCKS Protocol Versions
Authentication Testing and Bypass
No Authentication
Username/Password Brute-Forcing
Exploiting Weak Authentication Configurations
Tools for SOCKS Proxy Pentesting
Tool
Purpose
Using SOCKS Proxies for Network Pivoting
Proxy-Aware Pivoting
SSH + Dynamic Port Forwarding
Testing Real-World Exploitation Scenarios
Internal Web Service Access via SOCKS
Exploiting Services Behind SOCKS with Metasploit
Proxy Chaining for Deep Pivoting
Last updated