Metasploit
Metasploit
Usage:
route add/del IP SUBNET [COMM/SID] (proxy)
portfwd add/del -l PORT -p PORT -r IP (port forwarding)On a Meterpreter session, run:
run autoroute -s TARGET_SUBNET/MASKPort Forwarding with Metasploit
1) With SSH login
use auxiliary/scanner/ssh/ssh_login
set rhosts RHOSTS
set username USERNAME
set password PASSWORD
exploitUpgrade to Meterpreter session. Creates an EXTRA session with meterpreter
Check for applications that run internally within the target
Tunneling with Metasploit
1) autoroute (Deprecated)
Then go to web browser in Kali and make the manual proxy configuration settings
TIP: Instead, we can use proxychains to connect to internal machines in the network
Same steps apply to socks4a proxy
Last updated