Meterpreter-via-SSH

Meterpreter-via-SSH
Download Copy
Title: Meterpreter-via-SSH
Author: Zappus

This payload starts Packet Squirrel in NAT mode and awaits for user input. When the button is pressed, the payload connects to a remote SSH server and creates a local port tunnel. It then launches a meterpreter shell over said tunnel. The intent is to get a meterpreter shell on a target network in a way that hides meterpreter network traffic behind legitimate SSH activity.

There are many forms of remote access which may be used by different actors for various purposes. A red team may use remote access techniques that provide persistent access to an exploited target for the purposes of reconnaissance and lateral movement across the network. A systems administrator may use remote access to perform day to day operations on a network accessible computer. An array of techniques exist to obtain and maintain remote access across a network, including using a command and control server such as Cloud C². Common remote access techniques include reverse shells and may employ obfuscation techniques to mask the connection. See all remote access payloads.

This payload is for the Packet Squirrel, a matchbook-sized Ethernet multi-tool designed to give you covert remote access, painless packet captures, and secure VPN connections with the flip of a switch. This tiny linux-box is a man-in-the-middle that's nuts for networks.

Submit your own payload, or browse more featured Packet Squirrel Payloads.

 

 

Related Payloads

Droidex
Droidex
Droidex exfiltrates the top file stored in the Downloads directory of target mobile device to a self-hosted python webse
Read More
edit2exfil
edit2exfil
edit2exfil is a persistent file exfiltration payload that embeds itself as a cronjob on Linux systems via bash script, r
Read More
PixelReflection
PixelReflection
This payload exfiltrates files by creating a 1 pixel sized form in the top left of the screen and changes the background
Read More