EggShell icon indicating copy to clipboard operation
EggShell copied to clipboard

High level ports

Open St3v3a opened this issue 7 years ago • 1 comments

Hi, Great tool!

I wanted to simulate attack coming from Internet and have a VPN provider where I can forward high port numbers to my Kali machine (i.e 60444), I think there is an issue in that you cannot create a server on a port with 5 charterers long? tried using higher port with local network Kali VM as well and is the same issue.

Also for MetaSploit handler you can use advanced options to handle this type of scenario, which would be nice to engineer in -

use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_https

LHOST = KALI local IP

set LHOST 192.168.0.3 set LPORT 60422

ReverseListenerBindAddress = Public IP

set ReverseListenerBindAddress 10.x.x.x set ReverseListenerBindPort 60422

cheers Steve

St3v3a avatar Sep 04 '17 08:09 St3v3a

i have a vps how to use vps ip to forward it to my local kali in virtual machine ...

uthman3a avatar Sep 05 '17 11:09 uthman3a