Roles & Topology
Each wallhack node operates as one of three roles. Roles are assigned automatically based on your network topology — see Zero Config for how negotiation works.
Entry
Runs on the attacker's machine. Creates a TUN interface — a virtual network device — that routes traffic into the tunnel chain. Any traffic sent to a routed subnet arrives here and is forwarded onward.
wallhack Exit
The far end of the chain. Packets are unwrapped and delivered into the target network. No TUN interface required.
wallhack --connect HOST:PORT Relay (optional)
An intermediate host. Connects to a previous hop and listens for the next. Used for multi-hop pivoting through segmented networks where no direct path exists between entry and exit.
wallhack --connect HOST:PORT --listen :PORT Transport direction (--listen / --connect) is independent of role — entry and exit nodes can either listen or connect, which is how reverse tunnels work.