Remote Forward (opens 6443 on remote and forwards to local 192.168.1.1:443):
portfwd add -R -p 6443 -l 443 -L 192.168.1.1
Note: Chaining multiple forwards often leads to Metasploit timeouts/crashes. In this case its best to just forward a single hop via metasploit and another technique for the next hop (e.g. default windows forwarding).
Get a session on a box that can reach the server, then run autoroute -s addr/subnet alternativly you can add these manually via route add addr/subnet <session> Start the socks4a proxy module. Now we can use socat to make the server locally available: