You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The above command publishes the victim’s port **8080** as **attacker_ip:9000** without deploying any additional tooling – ideal for living-off-the-land pivoting.
728
728
729
+
## Covert VM-based Tunnels with QEMU
730
+
731
+
QEMU’s user-mode networking (`-netdev user`) supports an option called `hostfwd` that **binds a TCP/UDP port on the *host* and forwards it into the *guest***. When the guest runs a full SSH daemon, the hostfwd rule gives you a disposable SSH jump box that lives entirely inside an ephemeral VM – perfect for hiding C2 traffic from EDR because all malicious activity and files stay in the virtual disk.
732
+
733
+
### Quick one-liner
734
+
735
+
```powershell
736
+
# Windows victim (no admin rights, no driver install – portable binaries only)
737
+
qemu-system-x86_64.exe ^
738
+
-m 256M ^
739
+
-drive file=tc.qcow2,if=ide ^
740
+
-netdev user,id=n0,hostfwd=tcp::2222-:22 ^
741
+
-device e1000,netdev=n0 ^
742
+
-nographic
743
+
```
744
+
745
+
• The command above launches a **Tiny Core Linux** image (`tc.qcow2`) in RAM.
746
+
• Port **2222/tcp** on the Windows host is transparently forwarded to **22/tcp** inside the guest.
747
+
• From the attacker’s point of view the target simply exposes port 2222; any packets that reach it are handled by the SSH server running in the VM.
- [Hiding in the Shadows: Covert Tunnels via QEMU Virtualization](https://trustedsec.com/blog/hiding-in-the-shadows-covert-tunnels-via-qemu-virtualization)
0 commit comments