Tuesday, June 14, 2016

METASPLOIT - Port Forwarding


METASPLOIT - PORT FORWARDING 

- Layout for this exercise:





- In this attack Kali wants to access a web server on the Linux victim machine, using XP system as a pivot..

- First of all, a meterpreter session is achieved by exploiting the XP machine:




- We learn that XP has got two interfaces. The second interface is connected to the inner network 10.0.0.0/24:






- The active meterpreter session is number 1:




- Using session 1 to add a route to 10.0.0.0/24:




- Printing the route:




- Scanning 10.0.0.0/24 from the active meterpreter session 1:




- Once discovered 10.0.0.2 a TCP port scanning is performed, from port 1 to 500:











- Now, portforwarding is enabled to access the victim (IP 10.0.0.2 on port 80) from local port 9999. In this way the attacker would receive on localhost:9999 the web service from 10.0.0.2:80:




- Actually, a local listening port has been created on 9999. The forwarding connection will forward web services from 10.0.0.2:80 to localhost:9999, although attacker and victim are not directly connected because they are in different networks. The meterpreter session performs the connection in the background:




- The attack is successful when connecting the attacker's browser to localhost:9999:







No comments:

Post a Comment