Pivoting
Discovering New Targets
The trick here is to look for more IP addresses that are hidden. Look for ones that we didn't get from the initial ping sweep.
Meterpreter session
Look for more interfaces
Shell
Look at ALL the output.
Ping Sweep
ARP Scanner
Meterpreter
Routing
Port Scan
Proxying
Start by saying proxychain and then the command
we can also use proxychains to start our web browser.
Port Forwarding with Metasploit
Lets say we want to access a web server on port 80 on the victim machine.
Last updated