RockSolid Posted October 8, 2017 Posted October 8, 2017 Hey there! Can anyone help? I'm trying to make the following trick to work: pivoting the EBlue exploit. My test setup is (Vbox): 192.168.56.101 - MSF 192.168.56.102 - Win7 (pivot machine) 192.168.56.103 - Win 2008 (target) 192.168.56.104 - second MSF listener to send the session to. I establish the session from 102 back to 101. Then do route add, portfwd add -l 4000 -p 445 -r 192.168.56.103 Then RHOST 127.0.0.1, RPORT 4000. So the whole chain is 101 - 102 - 103 -> then either back to 101, or 104. But it fails to execute. Connecting - then !FAIL! etc etc. I'm omitting some output here - just want to know - should it work at all in this scenario? Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.