I thought I had found the Windows
iptables with Portproxy but I was wrong. But I learned something neat in the process and I am documenting it to access it when I need it.
Portproxy allows you to listen on a certain port on one of your network interfaces (or all interfaces) and redirect all traffic to that interface (on your computer) to another port/IP address.
to that interface is the limitation that unfortunately kills it. This will be a short post.
A typical Portproxy command is like this:
netsh interface portproxy add v4tov4 listenport=9090 listenaddress=192.168.0.100 connectaddress=192.168.1.200 connectport=9095
So I thought I could change the
listenaddress:listenport and redirect all outgoing traffic to that IP:port to wherever I wanted (e.g. localhost) and not use the Windows
etc\hosts file. But I was wrong, the command creates a listener on the interface with the
listeneraddress IP and redirects all TCP traffic. In other words, the
listeneraddress needs to be the IP of an interface of your machine. The traffic needs to be destined for your machine to be able to be redirected with this command. Well bummer.
Install IPv6 Support
Before we start, install IPv6 support in your OS. According to KB555744 Portproxy may not work if IPv6 support is not installed.
Why? I don't know but I think because Portproxy supports both IPv4 and IPv6 addresses which is a good thing. If you look at the MSDN link you can see the four variations that mix v4 and v6 addresses.
Portproxy in Action
Let's do something simple first, we want to redirect anything that goes to
Open an admin command prompt and run this command (
protocol=tcp is optional because Portproxy only supports TCP):
netsh interface portproxy add v4tov4 listenport=9090 listenaddress=127.0.0.1 connectaddress=126.96.36.199 connectport=443 protocol=tcp
Remember to remove the new line (I have split the command into two lines for better readability).
This command creates a listener on
localhost:9090 and forwards all traffic to
188.8.131.52:443 (which is Google for me - you will probably get a different IP address if you ping it).
We can display all current portproxy listeners using
netsh interface portproxy show all.
In the same admin command prompt run this command to see the listener:
netstat -anb | findstr 9090.
Now open a browser and navigate to
Accept the security exception and we will see:
Google.com but you know what we accomplished.
Apart from doing failed tricks we can do other things with this. As we saw we can redirect local resources to remote ones. Another is port changing, we can redirect the traffic to localhost via different means (e.g.
hosts file) but the port is still the original one used by the application. Using this we can redirect the port to another one on a remote machine (e.g. a VM running a proxy tool). In other words we will not need the Traffic Redirector Burp extension anymore.