1080 - Socks
💡 学习提示: 本文档介绍 1080 - SOCKS 的渗透测试方法,适合信息安全初学者和从业人员参考。
⚠️ 法律声明: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。
⚠️ 法律声明: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。
1080 - 渗透测试 Socks
基本信息
SOCKS is a protocol used for transferring data between a client and server through a proxy. The fifth version, SOCKS5, adds an optional authentication feature, allowing only authorized users to access the server. It primarily handles the proxying of TCP connections and the forwarding of UDP packets (via the UDP ASSOCIATE command), operating at the session layer (Layer 5) of the OSI model. When tooling supports the socks5h scheme, DNS resolution is forced through the proxy, preventing local DNS leaks and making it harder to fingerprint the originating host.
默认 端口: 1080
信息收集
认证 Check
暴力破解
Basic usage
Advanced usage
Output
Hydra module
Method & open-proxy enumeration
socks-methods forces the server to list supported authentication types, while socks-open-proxy attempts an outbound CONNECT to confirm whether the service can be abused as a relay.
Raw handshake check
A \x05 01 00 response indicates SOCKS5 offering “no authentication”. Any \x00 followed by \x02 means username/password is required, which is useful for quickly fingerprinting exposed devices in scripts.
Quick egress validation
Use --socks5-hostname (or socks5h:// URLs) so DNS resolution happens remotely. Pair it with proxychains4 -q nmap -sT -Pn --top-ports 200 <internal-host> to verify whether the proxy truly provides internal reach.
Internet-wide discovery / fingerprinting
Feed results back into NSE, zgrab2, or custom python scripts to prioritize promising hosts (e.g., banner strings like 3proxy, Dante, MikroTik).
Tunneling and 端口 Forwarding
For info about tunneling and post forwarding check the page: Tunneling and 端口 Forwarding