Need Help with Port Forwarding,

Jul 2, 2015 12:15 PM
Jul 2, 2015 02:13 PM
635714097794169942.jpg

I tried to get a Meterpreter reverse tcp session in WAN to my own second PC, I used my normal Gateway for the Attack Machine and an mobile W-lan hotspot with an Tablet-PC for the Target Machine.

If i understand it right to write the Payload i took as LHOST my public IP and Port 4444, 53, 443, 25, 80 usw... (i tried many ports). I execute the payload on my target pc and waiting for a response in Metasploit but there is nothing happend. After about 3 Days of Google, Testing and more Google im really sad becouse it doesnt want to work over WAN on LAN there is absolut no problem.

Port forwarding is the key but it wont work, here are few screenshots from my Gateway maybe some of you have a idea. I disabled also the Main switch of the Gateways Firewall to try but nothing changes....

635714097794169942.jpg
635714098270264272.jpg
635714098690891360.jpg
635714099494483138.jpg
635714099708076583.jpg
635714097794169942.jpg
635714098270264272.jpg
635714098690891360.jpg
635714099494483138.jpg
635714099708076583.jpg

These are my settings and here are a Scan report on my router with nmap the next thing is that also without the enabled firewall on the router i had to set the -Pn option in nmap.

635714101287295350.jpg

and here a scan of my Attack System

635714105636046155.jpg

I hope somebody can help me with my problem here are some Details on the Attack i tried:

For the Payload:

windows/meterpreter/reversetcp

LHOST = my public ip

Lport = 443 or 4444 or 53 or 25 or 80

In Metasploit with the multi/handler:

LHOST=192.168.1.5

LPORT= 443 or 4444 or ....usw...

If some of you need another Details only ask but i really need help with this also the port of my Gateway 443 is open but that is new today...

I also configured the MAC address of my Attack system to use a Bridge in the Gateway but really nothing helps.

Thanks for any Reply on my Problem!

Edit:

Other screenshots

635714178503233085.jpg

Comments

No Comments Exist

Be the first, drop a comment!