Metasploit mailing list archives

Re: Which modules work through a pivot point?


From: Rob Fuller <mubix () room362 com>
Date: Mon, 6 Sep 2010 01:41:27 -0400

1. Most should, please submit to this mailing list or create redmine tickets
for any that you are finding that don't

2. It highly depends on the operating systems of both attacker and victim.
If you are running meterpreter, then you can use the portfwd command.


--
Rob Fuller | Mubix
Certified Checkbox Unchecker
Room362.com | Hak5.org


On Mon, Sep 6, 2010 at 1:25 AM, John Nash <rootsecurityfreak () gmail com>wrote:

Hello All,

I have used Metasploit for the last couple of years casually, but now
I am giving it a serious look and considering purchasing express.

I am thus doing an independent research on Metasploit. Due to the lack
of documentation, I have a couple of questions:

1. Once you create a pivot (B) ...say between the Attacker (A) and the
victim (C), what modules on Metasploit can be run through the pivot?

I have added a route through the pivot meterpreter session

msf > route print

Active Routing Table
====================

  Subnet             Netmask            Gateway
  ------             -------            -------
  192.168.1.1        255.255.255.0      Session 1


but the auxiliary modules like portscan and unable to function ...they
just timeout. Are there only some modules which will work through a
pivot? and others which won't? Can some please clarify?


2. Is it possible to channel other tools on the Attacker machine
through this pivot somehow? What  i wanna do is say run a tool like
fping (and others ... ) on the remote network through the pivot ....
is this possible?


Thanks so much!

John
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: