Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
11 votes
1 answer
4k views

Meterpreter (Metasploit) anonymous reverse connection over Tor2web

The general consensus seems to be that one sets up a listener on a server accessible by a public IP and some port forwarding. For anonymity this should be a throw-away server or a hacked box. I've ...
Polarsbear's user avatar
0 votes
1 answer
1k views

How to attack a specific computer on a remote network? [closed]

In a situation where I know the victim's public ip of their router, how does an attacker attack a specific computer in that network using something like metasploit? Because when using metasploit in ...
pedro santos's user avatar
1 vote
0 answers
666 views

Metasploit to connect to a target behind NAT

During a pentest and I experienced a weird problem with connecting to the target machine which is behind a NAT network the scenario is basically, they have a public ip : 1.1.1.1 and there are ...
Security Geek's user avatar