Using the socks server module in Metasploit

To connect from non-Metasploit applications on our system to the internal network, we can setup the socks4a module in Metasploit and can proxy data originating from any application through our meterpreter session. Let's put our meterpreter on 192.168.10.111 in the background and run the auxiliary/server/socks4a module as follows:

We execute the module after setting the SRVHOST to 127.0.0.1 and keeping the SRVPORT default to 1080.

Change the host to 127.0.0.1 and port to 1080 in the /etc/proxychains.conf file in Kali Linux before running the above module.

Setting up the socks server, we can now run ...

Get Metasploit Revealed: Secrets of the Expert Pentester now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.