To access the target in the 10.0.0.0/24 network, we will have to route all the packets through the compromised Linux machine with the IP 192.168.216.129.
- To do this, we will use the route command, which will route traffic destined to a given subnet through a supplied session:
msf post(ping_sweep) > route add 10.0.0.0/24 2[*] Route addedmsf post(ping_sweep) > route printIPv4 Active Routing Table========================= Subnet Netmask Gateway ------ ------- ------- 10.0.0.0 255.255.255.0 Session 2[*] There are currently no IPv6 routes defined.msf post(ping_sweep) >
Look at the parameters of the route command. The add parameter will add the details to the routing table. Then, we provided the address of the target network ...