NetSH for Port Forwarding
Using Netsh for Port Forwarding
Netsh (Network Shell) is a powerful command-line utility in Windows that allows users to configure and manage various network settings. It’s a native tool included in Windows, making it a Living Off the Land Binary (LOLbin), meaning attackers can leverage it without needing to download or install any additional software. Since it's already part of the operating system, it's less likely to be flagged by security software or endpoint defenses.
In this guide, we’ll walk through how to use Netsh for port forwarding in a Windows environment.
What is Port Forwarding in Netsh?
Port forwarding allows you to map traffic from one port on a device (usually a router or firewall) to a specific port on another device or system. In the case of Netsh, you can configure port forwarding on a Windows machine to forward traffic from one local port to another, often for remote access or to enable internal services to be exposed externally.
Using Netsh for Port Forwarding
Netsh allows users to create inbound rules for port forwarding directly from the command line. Here’s how to set up a basic port forwarding rule:
Step 1: Open Command Prompt with Administrative Privileges
You’ll need to run Command Prompt as an administrator to execute Netsh
commands that modify network settings:
Search for cmd in the Start menu.
Right-click Command Prompt and select Run as Administrator.
Step 2: Add the Port Forwarding Rule
To forward a port using Netsh, use the following command syntax:
listenport
: The port on the local machine where you want to listen for incoming traffic.listenaddress
: The IP address of the local machine (usually0.0.0.0
for any IP on the local machine).connectport
: The port on the remote machine or target service that you want to forward traffic to.connectaddress
: The target machine's IP address to forward traffic to.
Example 1: Forward Port 8080 to Localhost
This command forwards all traffic that comes to port 8080
on the local machine to port 80
on localhost
.
Example 2: Forward External Port to Internal Network
This will forward any traffic arriving on port 8080
of the machine's external IP to port 8080
on the internal network machine at 192.168.1.10
.
Checking the Current Port Forwarding Rules
To view the active port forwarding rules on your system, use the following command:
This will display a list of all active port forwarding configurations.
Deleting a Port Forwarding Rule
If you need to remove a port forwarding rule, use the following command:
Example: Remove the Port Forwarding Rule for Port 8080
This will remove the rule that forwards traffic from port 8080
on the local machine.
Why Use Netsh for Port Forwarding? (LOLbin)
As a Living Off the Land Binary (LOLbin), Netsh is a built-in tool that is often overlooked by security teams. It allows attackers to configure network settings, including port forwarding, without the need for additional software. Since Netsh is already part of the Windows operating system, it's more likely to bypass security defenses like antivirus software or endpoint detection and response (EDR) systems.
In a penetration testing or red teaming scenario, leveraging Netsh for port forwarding provides a way to pivot within the network or expose services without raising suspicion. The fact that it is a native tool makes it harder to detect and block, giving attackers an advantage when trying to maintain stealth access to a target network.
Last updated