Forum Thread : PostExploitation with Metasploit over NGROK tunneled session (Privilege Escalation on Windows7 7600 running Quick Heal)
I have port forwarded my local port 4444 with NGROK and use 0.tcp.ngrok.io in payload for lhost and 157xx as lport in payload and set lhost as 127.0.0.1 in handler and 4444 as lport in handler this is how I did it okay https://youtu.be/7ICmUdsNTuM And now I want to gain privi ...more