# Port Forwarding Cheatsheet

## 1. **Container port forwarding to local system using SSH**

A service running on docker was discovered

<div align="left"><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2F3LkFNBlYB3cxE5e9kjuR%2Fimage.png?alt=media&#x26;token=7f831e5b-e578-4bd5-b07e-3d8931c0c1c6" alt=""></div>

<div align="left"><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2FqxJiY38qOT9AO3GFLVEz%2Fimage.png?alt=media&#x26;token=1fcb3930-de3b-485f-aea2-5177fc903c6a" alt=""></div>

**`ssh -L <local port>:<ip of container>:<remote port> <username>@<host>`**

```
ssh -L 6767:172.17.0.2:8080 aubreanna@internal.thm
```

<div align="left"><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2FTXXuSQ9CfzkofdrST4L5%2Fimage.png?alt=media&#x26;token=eb24dce4-a741-421d-884f-f277577e8031" alt=""></div>

## 2. SSH tunneling / Pivoting

Format:

here,

3 systems are there: attacker,&#x20;

compromised PC,&#x20;

system to go to = victim

here SSH is running on port 443 there fore -p 443. Else supply the port where SSH is running on

Therefore,

ssh -i \<id\_rsa of compromised PC> -p 443 \<hostname of compromissed PC>@\<ip of compromised PC> -L \<local port to forward on>:\<victim IP>:\<victim port to forward to on our local system>

ssh -i ssh\_key -p 443 root\@172.16.1.1 -L 8080:172.16.1.2:22

<figure><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2FQJcoqb9SfE2scUAG9wSq%2Fimage.png?alt=media&#x26;token=e0725021-6acf-4502-946d-73949b675b91" alt=""><figcaption></figcaption></figure>

<figure><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2FeGl8Kgwsw8Y9Mf6HOB58%2Fimage.png?alt=media&#x26;token=b53e740b-8048-42fc-9442-06c9fa896474" alt=""><figcaption></figcaption></figure>

<figure><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2F7KaXzCoVeNRDGHyzHeCe%2Fimage.png?alt=media&#x26;token=919abc38-a0de-413e-ba82-75590ab071f6" alt=""><figcaption></figcaption></figure>

## 3. Proxychains nmap scan to a hidden PC accessible via pivoting

Premise:&#x20;

Attacker machine: 10.10.0.10

Compromised machine: 10.10.0.66, 172.16.1.1

Victim Machine: 172.16.1.2

Target: nmap scan 172.16.1.2

Process: Use ssh -D option to create a proxy on local port. Here, 8080. 443 is the port where victim SSH is running.

ssh -D 127.0.0.1:8080 gibson\@172.16.1.1 -p 443

<figure><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2FjE6VPbrfrujEYEfYK9Ku%2Fimage.png?alt=media&#x26;token=86b580f0-ee4e-41d9-8b97-8a58a28d943b" alt=""><figcaption></figcaption></figure>

Then add this in proxychains conf file

<figure><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2F7cQAF3NZkFzXOnALVvFG%2Fimage.png?alt=media&#x26;token=516196fe-41fc-452f-a36c-0c8eaf1d5a7d" alt=""><figcaption></figcaption></figure>

Then run nmap scan

<figure><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2FPPdgzJxfMvFHEGAXVvs2%2Fimage.png?alt=media&#x26;token=551ad00a-d086-4252-a04e-5c9d4213fc40" alt=""><figcaption></figcaption></figure>

<figure><img src="https://62284611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MSvRnuhl_P5WCd1fZEn%2Fuploads%2FG54nRKOPsfhiWWZOImDe%2Fimage.png?alt=media&#x26;token=0f6c05a6-52fa-4fb5-8a96-a45521311273" alt=""><figcaption></figcaption></figure>
