O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using the client as a pivot point

When we compromise a machine, the next thing we want to do is use the client source to our advantage. This is because we know most networks are configured with the locations that are inside the network architecture being considered at a higher level of trust and not with a location that is outside the network. We refer to this as pivoting.

Pivoting

To set our potential pivot point, we first need to exploit a machine. Then we need to check for a second network card in the machine that is connected to another network, which we cannot reach without using the machine that we exploit. As an example in this book, we will use three machines with the Kali Linux machine as the attacker, a Windows XP machine as the first ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required