Sign in to follow this  
Followers 0
presently.unknown

Metasploit payloads

3 posts in this topic

I was wondering if anyone knew if Metasploit payloads (i.e. bind shells, not reverse) follow a proxy back to the host if a proxy is set in the advanced settings. I've looked around (I even tried going through the source on github-- didn't end well), and I can't find an answer.

I'm happy to finally be on this forum, I've been a reader for awhile.

0

Share this post


Link to post
Share on other sites

I was wondering if anyone knew if Metasploit payloads (i.e. bind shells, not reverse) follow a proxy back to the host if a proxy is set in the advanced settings. I've looked around (I even tried going through the source on github-- didn't end well), and I can't find an answer.

I'm happy to finally be on this forum, I've been a reader for awhile.

meterpreter's reverse_http and reverse_https payloads are the only Windows native payloads that obey the victim's proxy settings, and java payloads obey the victim's Java network settings. However I think what you were looking for was actually setting it on the attacker side and that's not something that is currently supported in any of the payloads to the best of my knowledge :-(

0

Share this post


Link to post
Share on other sites

You may be able to set up a script to run to set up certain proxy settings on the victim's computer as soon as meterpreter is installed, but I haven't looked into this.

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0