Jump to content

RockSolid

Members
  • Posts

    1
  • Joined

  • Last visited

Everything posted by RockSolid

  1. Hey there! Can anyone help? I'm trying to make the following trick to work: pivoting the EBlue exploit. My test setup is (Vbox): 192.168.56.101 - MSF 192.168.56.102 - Win7 (pivot machine) 192.168.56.103 - Win 2008 (target) 192.168.56.104 - second MSF listener to send the session to. I establish the session from 102 back to 101. Then do route add, portfwd add -l 4000 -p 445 -r 192.168.56.103 Then RHOST 127.0.0.1, RPORT 4000. So the whole chain is 101 - 102 - 103 -> then either back to 101, or 104. But it fails to execute. Connecting - then !FAIL! etc etc. I'm omitting some output here - just want to know - should it work at all in this scenario?
×
×
  • Create New...