π―Meterpreter Tunneling
Overview
Scenario Description
Network Topology
[Attack Host] ββ [Ubuntu Pivot] ββ [Windows Target]
10.10.14.x 10.129.202.64 172.16.5.19
(Meterpreter) (Internal Only)The Approach
1. Creating Meterpreter Payload for Pivot Host
Generate Linux Meterpreter Payload
Configure Metasploit Handler
Execute Payload on Pivot
Establish Meterpreter Session
2. Network Discovery Through Meterpreter
Ping Sweep with Meterpreter Module
Alternative Ping Sweep Methods
3. SOCKS Proxy Configuration
Configure Metasploit SOCKS Proxy
Verify SOCKS Proxy Status
Configure Proxychains
4. AutoRoute for Traffic Routing
Configure AutoRoute Module
Alternative: AutoRoute from Meterpreter Session
List Active Routes
5. Testing Proxy & Routing
Network Scanning Through Proxy
6. Meterpreter Port Forwarding
Local Port Forwarding with portfwd
Create Local TCP Relay
Connect Through Port Forward
Verify Connection with Netstat
7. Meterpreter Reverse Port Forwarding
Configure Reverse Port Forward
Setup Handler for Windows Payload
Generate Windows Payload
Execute Payload and Receive Shell
8. Traffic Flow Analysis
Local Port Forwarding Flow
Reverse Port Forwarding Flow
SOCKS Proxy Flow
9. Meterpreter vs SSH Tunneling Comparison
10. Troubleshooting Common Issues
AutoRoute Compatibility Warnings
SOCKS Proxy Connection Issues
Port Forward Verification
11. HTB Academy Official Walkthrough
Complete Step-by-Step Lab Solution
Question 1: Network Discovery
Question 2: AutoRoute Configuration
Lab Success Criteria
12. Best Practices
Session Management
Network Discovery
Security Considerations
13. Command Reference
Essential Meterpreter Commands
Metasploit Auxiliary Modules
References
Last updated