I am pentesting a windows box to which I have gained system privileges. This box has two network interfaces. I have been able to reach machines on the second interface via the below netsh command. However this is quite inefficient as it is one port at a time. And each remote host requires its own local listening port.
I have tried to research other ways to use netsh in a more dynamic fashion however I have not found anything.
What is the most simplistic way to achieve dynamic port forwarding on a remote windows box?
netsh interface portproxy add v4tov4 listenport=<LPORT> listenaddress=0.0.0.0 connectport=<RPORT> connectaddress=<RHOST>
If using metasploit is the best option I'm open to that. However if this can be done with powershell that is preferable.
Aucun commentaire:
Enregistrer un commentaire