How it works...

To access the target in the 10.0.0.0/24 network, we will have to route all the packets through the compromised Linux machine with the IP 192.168.216.129

  1. To do this, we will use the route command, which will route traffic destined to a given subnet through a supplied session:
msf post(ping_sweep) > route add 10.0.0.0/24 2[*] Route addedmsf post(ping_sweep) > route printIPv4 Active Routing Table=========================   Subnet Netmask Gateway   ------ ------- -------   10.0.0.0 255.255.255.0 Session 2[*] There are currently no IPv6 routes defined.msf post(ping_sweep) > 

Look at the parameters of the route command. The add parameter will add the details to the routing table. Then, we provided the address of the target network ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.