ZOOM THE IMAGES FOR BETTER QUALITY!!!
1. Let’s enter our router homepage:

2. We go to the port forwarding option (In my case “Game & Application Sharing”):

3. Let us add a new Game/Application name “Metasploit_example” and select to manual enter the ports:

4. Enter the reverse port of your payload and the port on which the router should forward it to your IP and click “Add”:

5. Now let’s enable the Game/Application, go to the Game & Application Sharing tab, select “Assign a game or application to a local network device”, select the application “Metasploit_example” and at the device you either select it with the device names or either click on the list and select “

6. Create the payload, using your external IP as LHOST:

7. Open up msfconsole, use the multi/handler exploit and the payload that you selected in the previous step.This time set your LHOST to your internal IP:

8. We have a shell !!:

Now a few tips in case this doesn’t work:
***Turn off your firewall.
***Check if the victims firewall blocks the reverse shell.
***Check your router firewall settings.
Some nice credits go to my friend Vlad who helped me make this test over the internet by being the victim.
I AM NOT RESPONSIBLE FOR WHAT YOU STUPID AND MINDLESS HAX0RS DO WITH THIS KNOWLEDGE !!!!!!
No comments:
Post a Comment