Posts

Showing posts from October, 2011

How to connect back your Drone if your network have Natting(Port Forward Cisco Way)

1)Must configure at Attacker Router =================================== Rouer>en Router# Router#config t # To forward port 3389 TCP to the computer that had the 192.168.1.24 ip address you would do the following. Router(config)# Router(config)#ip nat inside source static tcp 172.16.2.60 3389 interface fa0/0 3389 Router(config)#end Router# #Make sure to Write Memory to make it persistent Router#wr mem ================================ 2)Cannot Remove the Nat config that being done ( How to ) ====================================================== Error ------ Router(config)#no ip nat inside source static tcp 172.16.2.60 3389 interface fa0/0 3389 %Static entry in use, cannot remove Solution -------- Better to kill the jobs created by Metasploit Payload : jobs Output(Jobs) ----------- Id Name -- ---- 135 Auxiliary: server/browser_autopwn Payload : kill 135 [*] Cleaning up exploits... Then on Router Part. ------------------- Router#clear ip...

Undi Lah! Vote Now !

Image