Tagged: autorun, metasploit, post, usermap_script
- This topic has 20 replies, 2 voices, and was last updated 4 years, 7 months ago by
Diego Pérez.
- AuthorPosts
- July 3, 2020 at 6:02 pm #41314
arminius
ParticipantHello,
So I was following the instructions from lession 17.7. It seems that in the post/windows/manage/autorun is not present.
July 3, 2020 at 6:03 pm #41315arminius
ParticipantSeems the screenshot didn’t upload properly, so here is a direct link.
July 5, 2020 at 4:09 am #41426Diego Pérez
ModeratorHi Arminius!
Once you are inside msfconsole you can use the command:
search autorouteThis will tell you the exact path to the module. Metasploit developer’s have moved it from the location showed in the course.
Hope it helps!
DiegoJuly 6, 2020 at 3:52 pm #41503arminius
ParticipantHi Diego,
I found it and it did seem to work.
However, now I’ve got a new issue: Screenshot
I had forwarded the ports 4444 and 139 on my router. Still no effect.
July 6, 2020 at 4:06 pm #41504arminius
ParticipantPerhaps this would help: Screenshot 2
July 7, 2020 at 4:13 am #41564Diego Pérez
ModeratorHi Arminius!
Your second link is not working.Can you show the results of:
ifconfig and route -n in kali and metasploitable
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for all the machines?Thanks!
DiegoJuly 7, 2020 at 1:32 pm #41577arminius
ParticipantJuly 8, 2020 at 4:07 am #41625Diego Pérez
ModeratorHi Arminius!
The problem is that you are using bridged mode which is ro unreliable and more if you are attacking your host machine, also you won’t be able to pivot to metasploitable this way, you’ll need to use the 3 as virtual machines if you want to try this attack.Hope it helps!
DiegoJuly 8, 2020 at 1:40 pm #41638arminius
ParticipantHi,
So, the target machine is a remote machine, located on a completely separate network from mine. I am accessing the internet, to get to the target machine.
Does this make any difference? If not, then I set them all to NAT Network?July 8, 2020 at 1:40 pm #41639arminius
ParticipantAlso, just for information: the target machine is at our main office. I am working from my office, 30 mins away.
July 9, 2020 at 4:03 am #41663Diego Pérez
ModeratorHi Arminius!
Ok, so the attack can work even if the machine is outside the network but you’ll need to use a wireless adapter attached to kali and connected to your home router, then you’ll need to set the port forwarding rules, this is covered in Section 14 of the course. So the first step is to get a connection back from the victim machine, then you can try to pivot to any other machine. But I will suggest to try it in the virtual lab first, I mean in your host machine and kali and windows as virtual machines attaches to the same NAT Network.Hope it helps!
DiegoJuly 9, 2020 at 7:48 pm #41712arminius
ParticipantSo how do I go about ‘attaching’ the adapter to kali? I am in the process of testing this over the virtual network. Already have my ports forwarded.
July 10, 2020 at 4:14 am #41727Diego Pérez
ModeratorHi!
Ok, so let’s solve 1 issue at a time, did you get a working backdoor using NAT Network?Let me know.
DiegoJuly 13, 2020 at 2:27 pm #41998arminius
ParticipantHey,
Yes I got a working backdoor using the NAT Network. I tried to run the script for pivoting and got this.
July 14, 2020 at 3:29 am #42035Diego Pérez
ModeratorHi!
Cool, it looks like the autoroute module worked.Can you show the results of:
ifconfig and route -n in kali and metasploitable
ipconfig in windowsThanks!
Diego - AuthorPosts
- You must be logged in to reply to this topic.