O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Pivoting in a network

Well, this is a very interesting part of Metasploit where we will hack into a LAN network by compromising a system. Here, we already have a compromised system, and we have a meterpreter shell of that system.

  1. First let us check the IP settings on that system by typing in ipconfig. We can see in the screenshot that the victim has two network adapters. Adapter #2 has the IP of 10.10.10.1 range.
    Pivoting in a network
  2. Now we will check the whole network routing table using the route command by typing in route.
    Pivoting in a network
  3. Now our plan is to attack this additional network. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required