Jump to content


Active Members
  • Content Count

  • Joined

  • Last visited

About NetSecNow

  • Rank

Recent Profile Visitors

611 profile views
  1. Thanks for the replies. I did wind up doing the whole wireshark thing, and figured out what was wrong. I will be making a video tutorial on this for our NetSecNow project on youtube http://www.youtube.com/user/NetSecNow In short; I wasn't setting the LHOST right in the payload/exploit, and also the target machine on my remote lab must have auto updated or something because it was no longer subject to ms08_067_netapi, luckily another box was, and I got it working. Thanks for the help guys.
  2. A link for reference.. http://blog.strategiccyber.com/2013/03/28/pivoting-through-ssh/
  3. in msfconsole, you can issue the check command when you use exploit windows/smb.ms08_067. Yes, as I mentioned, when I port scan that box through that proxy, it shows open ports.
  4. If you use ToR be sure to use different dns servers, as tor is prone to dns leaking. www.opennicproject.org
  5. Hey Guys, Need a little help understanding ssh proxy forwarding, otherwise known as ssh pivoting. I Have read a few tutorials that were very vague, seen a few videos from Hak5, but It still hasn't hit home yet. Here's my lab setup; I have a few static IP's. I am testing a real world scenario using a remote ssh box to pivot and scan the remote internal network. I am also using Metasploit. Remote network: 75.xxx.xxx.x96 My local Public IP: 75.xxx.xxx.x98 .x96 is behind a pfsense firewall I have setup. Port 22 is fowarded to a Metaspolitable2 box I Have there, lan IP (no worries,
  • Create New...