Metasploit mailing list archives
Re: Which modules work through a pivot point?
From: John Nash <rootsecurityfreak () gmail com>
Date: Mon, 6 Sep 2010 14:15:59 +0530
damn! sounds like a killer! count me in as a beta tester :) JN On Mon, Sep 6, 2010 at 2:11 PM, Philip Sanderson < philip.k.sanderson () gmail com> wrote:
On Mon, Sep 6, 2010 at 3:25 PM, John Nash <rootsecurityfreak () gmail com>wrote:2. Is it possible to channel other tools on the Attacker machine through this pivot somehow? What i wanna do is say run a tool like fping (and others ... ) on the remote network through the pivot .... is this possible?I plan on adding this ability in the posix meterpreter. The general idea at the moment is to do something like raw socket on exploited machine metasploit talks to virtual distributed ethernet (vde.sourceforge.net). vde switch daemon can be connected to a qemu virtual machine, or a tun interface. you can also connect to virtual distributed ethernet daemons on remote machines, which gives you a lot more team work ability. it will also allow you to perform activities like mitm attacks, etc.
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Which modules work through a pivot point? John Nash (Sep 05)
- Re: Which modules work through a pivot point? Rob Fuller (Sep 05)
- Re: Which modules work through a pivot point? John Nash (Sep 05)
- Re: Which modules work through a pivot point? egypt (Sep 05)
- Message not available
- Re: Which modules work through a pivot point? John Nash (Sep 06)
- Re: Which modules work through a pivot point? c0lists (Sep 06)
- Re: Which modules work through a pivot point? John Nash (Sep 05)
- Re: Which modules work through a pivot point? Rob Fuller (Sep 05)
- Re: Which modules work through a pivot point? John Nash (Sep 06)
- Message not available
- Re: Which modules work through a pivot point? Philip Sanderson (Sep 08)
- Re: Which modules work through a pivot point? John Nash (Sep 06)