First establist a meterpreter sessions, then
Run autoroute command to add a route
run autoroute -s <ip> <subnet>
Confirm by typing run autoroute -p
run autoroute -p
Background session
route print
Now use auxillary scanners to target the new ip
After you find an open port in new target machine, you can use portfwd command inside meterpreter to forward that remote port to local port and continue your enumerations inside metasploit
portfwd
portfwd add -l <localport> -p <remoteport> -r <remotehost>
You can confirm by portfwd list
portfwd list
First establish a meterpreter sessions, then background it
Add a route route add ip/subnet <session_no>
route add ip/subnet <session_no>
Use socks_proxy auxiliary module to convert the meterpreter session to serve as a socks proxy:
socks_proxy
use auxiliary/server/socks_proxy set VERSION 4a set SRVPORT 9050 run -j
Now anything we sent over port 9050 would be sent over to the network we added to the route
Now you can add the port in proxychains and use it.
Last updated 2 years ago