Pivoting

Discovering New Targets

The trick here is to look for more IP addresses that are hidden. Look for ones that we didn't get from the initial ping sweep.

Meterpreter session

Look for more interfaces

Shell

Look at ALL the output.

Ping Sweep

ARP Scanner

Meterpreter

Routing

Port Scan

Proxying

Start by saying proxychain and then the command

we can also use proxychains to start our web browser.

Port Forwarding with Metasploit

Lets say we want to access a web server on port 80 on the victim machine.

Last updated