Redsocks traffic forwarding combined with iptables traffic transparent transmission under Linux appears socket: Too many open files and connect: Bad file descriptor

Under Linux, redsocks traffic forwarding combined with iptables traffic transparent transmission appears socket: Too many open files and connect: Bad file descriptor. Oct 8 18:59:34 localhost redsocks[26193]: connect: Bad file descriptor Oct 8 18:59:34 localhost redsocks[26193]: [192.168.10.10:53318->124.225.191.19:443]: red_connect_relay: Bad file descriptor Oct 8 18:59:34 localhost redsocks[26193]: [192.168.10.10:53318->124.225.191.19:443]: dropping client (R/W), relay (R/W), idle 0.000234s Oct […]

docker-compose install socks5

docker-compose.yml version: ‘3.3’ services: socks5: image: registry.cn-hangzhou.aliyuncs.com/study-namespace/socks5 container_name: socks5 restart: always ports: – 16688:1080 entrypoint: [ “bash”, “-c”, “/usr/sbin/ss5 & amp; & amp; tail -100f /var/log/ss5/ss5.log”] volumes: – ./ss5.conf:/etc/opt/ss5/ss5.conf:ro – ./ss5.passwd:/etc/opt/ss5/ss5.passwd:ro ss5.conf The current configuration requires user authentication. If you do not want user authentication, modify it as follows auth 0.0.0.0/0 – – permit – […]

Practical Cases of Go Language SOCKS5 Proxy | Youth Training Camp

Powered by:NEFU AB-IN Article directory Practical case of Go language SOCKS5 agent | youth training camp Introduction TCP echo server auth authentication Request Phase relay stage Practical case of Go language SOCKS5 agent | youth training camp GO language engineering practical homework: implementation ideas, code and path records Introduction A proxy is a computer network […]

Intranet penetration test: Use RDP protocol to build Socks5 proxy tunnel

Previous articles: “Intranet Penetration Testing: A Preliminary Exploration of Remote Desktop Security Issues” “Intranet Penetration Testing: Different Ways to Log In to Remote Desktop” “Intranet Penetration Testing: RDP Based on File Transfer” Reverse Attack》 “Intranet Penetration Testing: Obtaining Remote Desktop Connection Records and RDP Credentials Foreword Today, within many organizations, only computer devices in the […]

Intranet penetration-tunnel technology (socks forwarding, ssh tunnel)

Traffic forwarding This article will introduce tunneling technology often used in intranet penetration Socks forwarding Introduction to experimental environment At present, we have obtained the session of server2008-2, but the domain control host cannot communicate directly with CS TeamServer on the intranet, so we need to add proxy forwarding. Before performing the forwarding operation, the […]

Intranet penetration-tunnel technology (socks forwarding, ssh tunnel)

Traffic forwarding This article will introduce tunneling technology often used in intranet penetration Socks forwarding Introduction to experimental environment At present, we have obtained the session of server2008-2, but the domain control host cannot communicate directly with CS TeamServer on the intranet, so we need to add proxy forwarding. Before performing the forwarding operation, the […]

Intranet penetration test: Use RDP protocol to build Socks5 proxy tunnel

Previous articles: “Intranet Penetration Testing: A Preliminary Exploration of Remote Desktop Security Issues” “Intranet Penetration Testing: Different Ways to Log In to Remote Desktop” “Intranet Penetration Testing: RDP Based on File Transfer” Reverse Attack》 “Intranet Penetration Testing: Obtaining Remote Desktop Connection Records and RDP Credentials Foreword Today, in many organizations, only those devices are usually […]

EarthWorm(ew): Port forwarding and SOCKS5 proxy tool in complex network environment

One sentence description: data forwarding, transfer-out and transfer-in tool under complex intranet; often used for socks5 proxy, deep scanning intranet; Official: EarthWorm is a tool for enabling SOCKS v5 proxy services. It is developed based on standard C and can provide transfer communication between multiple platforms for data forwarding in complex network environments. Zero, Preface […]

Intranet penetration-tunnel technology (socks forwarding, ssh tunnel)

Traffic forwarding This article will introduce the tunneling technology often used in intranet penetration Socks forwarding Introduction to Experimental Environment At present, the server2008-2 session has been obtained, but the domain control host cannot communicate directly with CS TeamServer in the internal network, so it is necessary to add proxy forwarding Before forwarding, you need […]

Intranet Penetration Test: Using RDP Protocol to Build a Socks5 Proxy Tunnel

Previous articles: “Intranet Penetration Testing: A Preliminary Exploration of Remote Desktop Security Issues” “Intranet Penetration Testing: Different Postures for Logging in to Remote Desktop” “Intranet Penetration Testing: RDP Based on File Transfer” reverse attack “Intranet Penetration Testing: Obtaining Remote Desktop Connection Records and RDP Credentials Foreword Today, in many organizations, only those devices are usually […]