Hey there! Can anyone help?
I'm trying to make the following trick to work: pivoting the EBlue exploit.
My test setup is (Vbox):
192.168.56.101 - MSF
192.168.56.102 - Win7 (pivot machine)
192.168.56.103 - Win 2008 (target)
192.168.56.104 - second MSF listener to send the session to.
I establish the session from 102 back to 101.
Then do route add, portfwd add -l 4000 -p 445 -r 192.168.56.103
Then RHOST 127.0.0.1, RPORT 4000. So the whole chain is 101 - 102 - 103 -> then either back to 101, or 104.
But it fails to execute. Connecting - then !FAIL! etc etc.
I'm omitting some output here - just want to know - should it work at all in this scenario?