Tagged: autorun, metasploit, post, usermap_script
- This topic has 20 replies, 2 voices, and was last updated 4 years, 5 months ago by Diego Pérez.
- AuthorPosts
- July 3, 2020 at 6:02 pm #41314arminiusParticipant
Hello,
So I was following the instructions from lession 17.7. It seems that in the post/windows/manage/autorun is not present.
July 3, 2020 at 6:03 pm #41315arminiusParticipantSeems the screenshot didn’t upload properly, so here is a direct link.
July 5, 2020 at 4:09 am #41426Diego PérezModeratorHi Arminius!
Once you are inside msfconsole you can use the command:
search autorouteThis will tell you the exact path to the module. Metasploit developer’s have moved it from the location showed in the course.
Hope it helps!
DiegoJuly 6, 2020 at 3:52 pm #41503arminiusParticipantHi Diego,
I found it and it did seem to work.
However, now I’ve got a new issue: Screenshot
I had forwarded the ports 4444 and 139 on my router. Still no effect.
July 6, 2020 at 4:06 pm #41504arminiusParticipantPerhaps this would help: Screenshot 2
July 7, 2020 at 4:13 am #41564Diego PérezModeratorHi Arminius!
Your second link is not working.Can you show the results of:
ifconfig and route -n in kali and metasploitable
ipconfig in windows
Can you share a screenshot of the Network settings used in VirtualBox for all the machines?Thanks!
DiegoJuly 7, 2020 at 1:32 pm #41577arminiusParticipantJuly 8, 2020 at 4:07 am #41625Diego PérezModeratorHi Arminius!
The problem is that you are using bridged mode which is ro unreliable and more if you are attacking your host machine, also you won’t be able to pivot to metasploitable this way, you’ll need to use the 3 as virtual machines if you want to try this attack.Hope it helps!
DiegoJuly 8, 2020 at 1:40 pm #41638arminiusParticipantHi,
So, the target machine is a remote machine, located on a completely separate network from mine. I am accessing the internet, to get to the target machine.
Does this make any difference? If not, then I set them all to NAT Network?July 8, 2020 at 1:40 pm #41639arminiusParticipantAlso, just for information: the target machine is at our main office. I am working from my office, 30 mins away.
July 9, 2020 at 4:03 am #41663Diego PérezModeratorHi Arminius!
Ok, so the attack can work even if the machine is outside the network but you’ll need to use a wireless adapter attached to kali and connected to your home router, then you’ll need to set the port forwarding rules, this is covered in Section 14 of the course. So the first step is to get a connection back from the victim machine, then you can try to pivot to any other machine. But I will suggest to try it in the virtual lab first, I mean in your host machine and kali and windows as virtual machines attaches to the same NAT Network.Hope it helps!
DiegoJuly 9, 2020 at 7:48 pm #41712arminiusParticipantSo how do I go about ‘attaching’ the adapter to kali? I am in the process of testing this over the virtual network. Already have my ports forwarded.
July 10, 2020 at 4:14 am #41727Diego PérezModeratorHi!
Ok, so let’s solve 1 issue at a time, did you get a working backdoor using NAT Network?Let me know.
DiegoJuly 13, 2020 at 2:27 pm #41998arminiusParticipantHey,
Yes I got a working backdoor using the NAT Network. I tried to run the script for pivoting and got this.
July 14, 2020 at 3:29 am #42035Diego PérezModeratorHi!
Cool, it looks like the autoroute module worked.Can you show the results of:
ifconfig and route -n in kali and metasploitable
ipconfig in windowsThanks!
Diego - AuthorPosts
- You must be logged in to reply to this topic.