Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

problem when using socks5 #538

Open
protrading104 opened this issue Jan 8, 2025 · 0 comments
Open

problem when using socks5 #538

protrading104 opened this issue Jan 8, 2025 · 0 comments

Comments

@protrading104
Copy link

no connection when checking. has anyone encountered this problem ?

C2 server log error:
image

socks5 settings
image

just checking via proxychains
image

havoc is listening on port 3386
image

some tcpdump logs:
100.100.100.100 - HAVOC C2
100.100.100.100.3386 - socks5

sudo tcpdump -i any port 3386 -n
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:48:15.072286 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [SEW], seq 1577557269, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
21:48:15.072334 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
21:48:16.072891 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [SEW], seq 1577557269, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
21:48:16.072934 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
21:48:17.095932 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [S.], seq 2550158612, ack 1577557270, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
21:48:17.113020 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [.], ack 1, win 1026, length 0
21:48:17.114605 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [P.], seq 1:4, ack 1, win 1026, length 3
21:48:17.114630 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 4, win 502, length 0
21:48:17.114681 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [P.], seq 1:3, ack 4, win 502, length 2
21:48:17.132273 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [P.], seq 4:14, ack 3, win 1026, length 10
21:48:17.175872 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 14, win 502, length 0
21:48:32.135918 eth0 Out IP 100.100.100.100.3386 > 200.200.200.200.7834: Flags [.], ack 14, win 502, length 0
21:48:32.149806 eth0 In IP 200.200.200.200.7834 > 100.100.100.100.3386: Flags [F.], seq 14, ack 3, win 1026, length 0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant