首页 > 其他 > 详细

Ethical Hacking - POST EXPLOITATION(4)

时间:2020-02-07 18:11:10      阅读:53      评论:0      收藏:0      [点我收藏+]

PIVOTING

  • Use the hacked device as a pivot.
  • Try to gain access to other devices in the network.

Tool: Metasploit - AUTOROUTE Module

Target: Metasploitable VM

  • Set up a route between hacker and hacked device.
  • Gives hacker access to devices on the network.
  • Use Metasploit exploits auxiliaries ...etc

1. Use it 

use post/multi/manage/autoroute

技术分享图片

2. Set subnet of the target network

set subnet [subnet]

技术分享图片

3. Set Session id.

set session [id]

技术分享图片

4. exploit

exploit

技术分享图片

 

Then you can exploit Metasplotable VM now.

技术分享图片

 

For more information about Pivoting, please refer to:

https://www.offensive-security.com/metasploit-unleashed/pivoting/

Ethical Hacking - POST EXPLOITATION(4)

原文:https://www.cnblogs.com/keepmoving1113/p/12272946.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!