O'Reilly logo

Metasploit Revealed: Secrets of the Expert Pentester by Nipun Jaswal, Sagar Rahalkar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using the socks server module in Metasploit

To connect from non-Metasploit applications on our system to the internal network, we can setup the socks4a module in Metasploit and can proxy data originating from any application through our meterpreter session. Let's put our meterpreter on 192.168.10.111 in the background and run the auxiliary/server/socks4a module as follows:

We execute the module after setting the SRVHOST to 127.0.0.1 and keeping the SRVPORT default to 1080.

Change the host to 127.0.0.1 and port to 1080 in the /etc/proxychains.conf file in Kali Linux before running the above module.

Setting up the socks server, we can now run ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required