From 4e0cea6757eb4615d5db22853960ff6fcb0c31d5 Mon Sep 17 00:00:00 2001 From: skyper <5938498+SkyperTHC@users.noreply.github.com> Date: Sun, 1 Sep 2024 19:14:59 +0100 Subject: [PATCH] Update README.md --- README.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 2653643..05816ba 100644 --- a/README.md +++ b/README.md @@ -569,6 +569,8 @@ socat TCP-LISTEN:25,reuseaddr,fork openssl-connect:smtp.gmail.com:465 **3.iii.a Raw TCP reverse ports** +Useful for reverse backdoors that need a TCP Port on a PUBLIC IP Address: + Using [segfault.net](https://thc.org/segfault.net) (free): ```sh # Request a random public TCP port: @@ -589,7 +591,7 @@ using [serveo.net](https://serveo.net) (free): ssh -R 0:localhost:31337 serveo.net ``` -See also [remote.moe](#revese-shell-remote-moe) (free) to forward raw TCP from the target to your workstation or [ngrok](https://ngrok.com/) (paid subscription) to forward a raw public TCP port. +See also [remote.moe](#revese-shell-remote-moe) (free) to forward raw TCP from the target to your workstation or [playit](https://playit.gg/) (free) or [ngrok](https://ngrok.com/) (paid subscription) to forward a raw public TCP port. Other free services are limited to forward HTTPS only (not raw TCP). Some tricks below show how to tunnel raw TCP over HTTPS forwards (using websockets).