This is for msf6 framework , since they have changed a lot of module names and the way you interact with them.

This is how you use autoroute & socks_proxy in metasploit. all the online materials I found either didn't conver this whole or just plain old.

Target Network:

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/af1bf9cc-c278-4369-8561-629ad246d719/Untitled.png


Tools

  1. Metasploit msf6 framework (in this case)
  2. proxychains

Conditions

  1. We can communicate with the DMZ infra but not the Coperate.
  2. We are not able to scan the 10.10.51.0/24 with the our tap0
  3. We have to leverage A phish user to click a browser exploit and open a Dynamic Tunnel to the Corporate enviroment which is the 10.10.51.0/24 network.
  4. In this case, our victim is 10.10.50.8.
  5. And we want to enumerate 10.10.51.21.
  6. nmap scan without proxy

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/1a3ac5ae-f2f8-4991-90c9-8a6465e78218/Untitled.png