Metasploit mailing list archives

Re: Which modules work through a pivot point?


From: John Nash <rootsecurityfreak () gmail com>
Date: Mon, 6 Sep 2010 14:15:59 +0530

damn! sounds like a killer!

count me in as a beta tester :)

JN

On Mon, Sep 6, 2010 at 2:11 PM, Philip Sanderson <
philip.k.sanderson () gmail com> wrote:


On Mon, Sep 6, 2010 at 3:25 PM, John Nash <rootsecurityfreak () gmail com>wrote:

2. Is it possible to channel other tools on the Attacker machine
through this pivot somehow? What  i wanna do is say run a tool like
fping (and others ... ) on the remote network through the pivot ....
is this possible?


I plan on adding this ability in the posix meterpreter. The general idea at
the moment is to do something like

raw socket on exploited machine

metasploit talks to virtual distributed ethernet (vde.sourceforge.net).

vde switch daemon can be connected to a qemu virtual machine, or a tun
interface. you can also connect to virtual distributed ethernet daemons on
remote machines, which gives you a lot more team work ability.

it will also allow you to perform activities like mitm attacks, etc.

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: