AutoBlue-MS17-010 icon indicating copy to clipboard operation
AutoBlue-MS17-010 copied to clipboard

Running the listener on a separate host

Open bcnx opened this issue 3 years ago • 1 comments

Hi,

I'm doing my pentesting via a locally installed Pi that offers an OpenVPN connection for me. The Pi is in the LAN of the client and I use that in combination with a Kali install that connects via VPN.

I don't think I can compile the shellcode on the Pi, so I ded that on Kali. I cannot start the listener on Kali however,, because it has no IP on the client's LAN. It has a TUN interface in another range.

Can the code be changed so I can use a listener on another host?

Cheers,

BC

bcnx avatar Dec 11 '21 20:12 bcnx

Hey, I compiled on a x64 host and copied everything over to the Pi and I was able to run both Python scripts. I do get this though: good response status: INVALID_PARAMETER

Is that something that can be helped?

Chers,

BC

bcnx avatar Dec 12 '21 15:12 bcnx

Hey, this isn't really relevant to this repository. This question is about exploitation guidance and setup and not about any bug in the code itself.

To answer your question however: It should be as simple as specifying your listening hosts IP when you generate the payloads. Then on your listening host, start up metasploit and launch the multi handlers manually. I do this all the time if I need to egress out of an environment for any reason. If it is not working I would advise it's likely a networking issue or an issue on your listening host. That is all I can do to advise however, good luck!

3ndG4me avatar Jan 08 '23 21:01 3ndG4me