Thursday, October 27, 2011

How to connect back your Drone if your network have Natting(Port Forward Cisco Way)

1)Must configure at Attacker Router
===================================
Rouer>en
Router#
Router#config t

# To forward port 3389 TCP to the computer that had the 192.168.1.24 ip address you would do the following.

Router(config)#
Router(config)#ip nat inside source static tcp 172.16.2.60 3389 interface fa0/0 3389
Router(config)#end
Router#

#Make sure to Write Memory to make it persistent
Router#wr mem

================================



2)Cannot Remove the Nat config that being done ( How to )
======================================================

Error
------
Router(config)#no ip nat inside source static tcp 172.16.2.60 3389 interface fa0/0 3389
%Static entry in use, cannot remove

Solution
--------
Better to kill the jobs created by Metasploit
Payload : jobs

Output(Jobs)
-----------
Id Name
-- ----
135 Auxiliary: server/browser_autopwn

Payload : kill 135
[*] Cleaning up exploits...

Then on Router Part.
-------------------
Router#clear ip nat translation *

*EOF*

No comments:

Post a Comment