Ausnahme gefangen: SSL certificate problem: certificate is not yet valid 📌 Iox - Tool For Port Forward &Amp; Intranet Proxy

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 Iox - Tool For Port Forward &Amp; Intranet Proxy


💡 Newskategorie: IT Security Nachrichten
🔗 Quelle: feedproxy.google.com


Tool for port forward & intranet proxy, just like lcx/ew, but better

Why write?
lcx and ew are awesome, but can be improved.
when I first used them, I can't remember these complicated parameters for a long time, such as tran, slave, rcsocks, sssocks.... The work mode is clear, why do they design parameters like this(especially ew's -l -d -e -f -g -h)
Besides, I think the net programming logic could be optimized.
For example, while running lcx -listen 8888 9999 command, client must connect to :8888 first, then :9999, in iox, there's no limit to the order in two ports. And while running lcx -slave 1.1.1.1 8888 1.1.1.1 9999 command, lcx will connect two hosts serially, but it's more efficient to connect in concurrent, as iox does.
What's more, iox provides traffic encryption feature. Actually, you can use iox as a simple ShadowSocks.
And iox also provides UDP traffic forward.
Of course, because iox is written in Go, the static-link-program is a little large, raw program is 2.2MB (800KB after UPX compression)

Feature
  • traffic encryption (optional)
  • humanized CLI option
  • logic optimization
  • UDP traffic forward

Usage
You can see, all params are uniform. -l/--local means listen on a local port; -r/--remote means connect to remote host

Two mode
fwd
Listen on 0.0.0.0:8888 and 0.0.0.0:9999, forward traffic between 2 connections
./iox fwd -l 8888 -l 9999


for lcx:
./lcx -listen 8888 9999
Listen on 0.0.0.0:8888, forward traffic to 1.1.1.1:9999
./iox fwd -l 8888 -r 1.1.1.1:9999


for lcx:
./lcx -tran 8888 1.1.1.1 9999
Connect 1.1.1.1:8888 and 1.1.1.1:9999, forward between 2 connection
./iox fwd -r 1.1.1.1:8888 -r 1.1.1.1:9999


for lcx:
./lcx -slave 1.1.1.1 8888 1.1.1.1 9999
proxy
Start Socks5 server on 0.0.0.0:1080
./iox proxy -l 1080


for ew:
./ew -s ssocksd -l 1080
Start Socks5 server on be-controlled host, then forward to internet VPS
VPS forward 0.0.0.0:9999 to 0.0.0.0:1080
You must use in pair, because it contains a simple protocol to control connecting back
./iox proxy -r 1.1.1.1:9999
./iox proxy -l 9999 -l 1080 // notice, the two port are in order


for ew:
./ew -s rcsocks -l 1080 -e 9999
./ew -s rssocks -d 1.1.1.1 -e 9999
Then connect intranet host
# proxychains.conf
# socks5://1.1.1.1:1080

$ proxychains rdesktop 192.168.0.100:3389


Enable encryption
For example, we forward 3389 port in intranet to our VPS
// be-controller host
./iox fwd -r 192.168.0.100:3389 -r *1.1.1.1:8888 -k 656565


// our VPS
./iox fwd -l *8888 -l 33890 -k 656565
It's easy to understand: traffic between be-controlled host and our VPS:8888 will be encrypted, the pre-shared secret key is 'AAA', iox will use it to generate seed key and nonce (Normally, nonce shouldn't be reused. But consider that iox's encryption is only for bypassing IDS, in order not to allocate extra space, the TCP stream encryption will reuse the nonce), then encrypt with Xchacha20 (replace AES-CTR with Xchacha20 in v0.3 version)
So, the * should be used in pairs
./iox fwd -l 1000 -r *127.0.0.1:1001 -k 000102
./iox fwd -l *1001 -r *127.0.0.1:1002 -k 000102
./iox fwd -l *1002 -r *127.0.0.1:1003 -k 000102
./iox proxy -l *1003 -k 000102


$ curl google.com -x socks5://127.0.0.1:1000
Using iox as a simple ShadowSocks
// ssserver
./iox proxy -l *9999 -k 000102


// sslocal
./iox fwd -l 1080 -r *VPS:9999 -k 000102

UDP forward
Only need to add CLI option -u
./iox fwd -l 53 -r *127.0.0.1:8888 -k 000102 -u
./iox fwd -l *8888 -l *9999 -k 000102 -u
./iox fwd -r *127.0.0.1:9999 -r 8.8.8.8:53 -k 000102 -u
NOTICE: When you make a multistage connection, the Remote2Remote-UDP-mode must be started last, which is the No.3 command in above example
UDP forwarding may have behavior that is not as you expected. Actually, on GitHub now, there are only examples of forwarding a local listener to a remote host, so I can only implement them with my understanding
You can find why in the source code. If you have any ideas, PR / issue are welcomed



...



📌 CVE-2023-20065 | Cisco IOS XE IOx Application Hosting Environment access control (cisco-sa-iox-priv-escalate-Xg8zkyPk)


📈 41.25 Punkte

📌 https://intranet.ufpr.br/intranet/dkr.txt


📈 32.67 Punkte

📌 http://intranet.esforse.mil.ec/intranet/b0x.txt


📈 32.67 Punkte

📌 Is there a linux equivalent to the MacOS app "Port Mapper"? I'm trying to port forward via UPnP.


📈 32.32 Punkte

📌 What is Forward Proxy and Reverse Proxy


📈 31.19 Punkte

📌 Samba security in Tumbleweed, shares only accessible on intranet if external port is enabled


📈 26.12 Punkte

📌 Simple ngrok alternative to forward a local port on your machine and make it publicly accessible (only <30 lines of bash)


📈 22.53 Punkte

📌 Why can't a VM pass through a port forward?


📈 22.53 Punkte

📌 Should i DMZ or Port forward my personal cloud


📈 22.53 Punkte

📌 How to port forward virtual machine created from the snap Sosumi?


📈 22.53 Punkte

📌 How to port forward through the firewall on Ubuntu


📈 22.53 Punkte

📌 How to port forward through the firewall on Ubuntu


📈 22.53 Punkte

📌 How to Forward Port in Docker


📈 22.53 Punkte

📌 Kubectl Port-forward Flow Explained


📈 22.53 Punkte

📌 PSC - E2E Encryption For Multi-Hop Tty Sessions Or Portshells + TCP/UDP Port Forward


📈 22.53 Punkte

📌 Forward proxy in 2021?


📈 21.97 Punkte

📌 Vuln: Cisco IOS Software and IOx Software CVE-2017-3805 Information Disclosure Vulnerability


📈 20.63 Punkte

📌 Cisco IOS, Cisco IOx Software: Eine Schwachstelle ermöglicht das Ausspähen von Informationen


📈 20.63 Punkte

📌 Cisco IOX XR bis 4.3.2 auf GSR 12000 UDP Packet Handler Denial of Service


📈 20.63 Punkte

📌 Vuln: Cisco IOS Software and IOx Software CVE-2017-3805 Information Disclosure Vulnerability


📈 20.63 Punkte

📌 Cisco IOS, Cisco IOx Software: Eine Schwachstelle ermöglicht das Ausspähen von Informationen


📈 20.63 Punkte

📌 Cisco IOx: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebigen Programmcodes mit Administratorrechten


📈 20.63 Punkte

📌 Cisco Patches Critical IOx Vulnerability


📈 20.63 Punkte

📌 Seaborn Networks und IOX Cable: Seekabelbetreiber verbinden ihre Glasfaser


📈 20.63 Punkte

📌 Cisco IOS/IOx on IR829/IR809/IE4K/CGR1K Web-based Management Interface information disclosure


📈 20.63 Punkte

📌 Cisco Fog Director 1.0(0) auf IOx Cartridge Interface erweiterte Rechte


📈 20.63 Punkte

📌 Cisco IOS/IOS XE IOx Web Server HTTPS Request denial of service


📈 20.63 Punkte

📌 Cisco IOS XE IOx Guest Shell privilege escalation [CVE-2019-12670]


📈 20.63 Punkte

📌 Cisco IOS IOx Application Environment input validation [CVE-2020-3199]


📈 20.63 Punkte

📌 Cisco IOS XE IOx Application Hosting Infrastructure access control


📈 20.63 Punkte

📌 Cisco IOS IOx Application Environment input validation [CVE-2020-3257]


📈 20.63 Punkte

📌 Cisco IOS IOx Application Environment Application Package input validation


📈 20.63 Punkte

📌 Cisco ISO IOx Application Environment Application Package link following


📈 20.63 Punkte

📌 Cisco IOS/IOS XE IOx erweiterte Rechte [CVE-2016-6414]


📈 20.63 Punkte











matomo