Metasploit mailing list archives

Re: Which modules work through a pivot point?


From: c0lists <lists () carnal0wnage com>
Date: Mon, 6 Sep 2010 14:06:51 -0400

I've had success using most of the auxiliary modules through a
meterpreter session

portscan/tcp and discovery/udp_probe have worked for me as well as
mssql modules, oracle modules, all the http modules, etc

-CG

On Mon, Sep 6, 2010 at 1:58 AM,  <egypt () metasploit com> wrote:
Anything that uses raw sockets (like the syn scanner and others) won't
work through the tunnel (since we would have to have raw IP on the
victim as well which is problematic on Windows).  You can increase the
logging verbosity by doing 'setg LogLevel 5'.  More info will then be
logged to ~/.msf3/logs/framework.log.

As for your second request, you can set up portfwds on every port
programmatically but there is no command to do so.  If you need
something like that, I would suggest doing it from irb and, if you
find yourself needing to do it often, write it up in a meterpreter
script.

Hope this helped,
egypt

On Sun, Sep 5, 2010 at 11:48 PM, John Nash <rootsecurityfreak () gmail com> wrote:
Rob,

Thanks for the quick response!

1. While pivoting, are there any debugs I can turn on to look into
what is happening under the hood in more detail?

2. A lot of tools i want to use may want to target multiple services
on the remote system at the same time. Is there some easy command
using which I can forward all ports to the remote system? instead of
having to setup one for each port manually?

JN

On 9/6/10, Rob Fuller <mubix () room362 com> wrote:
1. Most should, please submit to this mailing list or create redmine tickets
for any that you are finding that don't

2. It highly depends on the operating systems of both attacker and victim.
If you are running meterpreter, then you can use the portfwd command.


--
Rob Fuller | Mubix
Certified Checkbox Unchecker
Room362.com | Hak5.org


On Mon, Sep 6, 2010 at 1:25 AM, John Nash
<rootsecurityfreak () gmail com>wrote:

Hello All,

I have used Metasploit for the last couple of years casually, but now
I am giving it a serious look and considering purchasing express.

I am thus doing an independent research on Metasploit. Due to the lack
of documentation, I have a couple of questions:

1. Once you create a pivot (B) ...say between the Attacker (A) and the
victim (C), what modules on Metasploit can be run through the pivot?

I have added a route through the pivot meterpreter session

msf > route print

Active Routing Table
====================

  Subnet             Netmask            Gateway
  ------             -------            -------
  192.168.1.1        255.255.255.0      Session 1


but the auxiliary modules like portscan and unable to function ...they
just timeout. Are there only some modules which will work through a
pivot? and others which won't? Can some please clarify?


2. Is it possible to channel other tools on the Attacker machine
through this pivot somehow? What  i wanna do is say run a tool like
fping (and others ... ) on the remote network through the pivot ....
is this possible?


Thanks so much!

John
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: