From the course: Metasploit Essential Training

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Understand how to pivot

Understand how to pivot

- [Instructor] Pivoting is the technique of using a target machine to move around inside a network. Basically using the first machine compromise to aid in the compromise of other inaccessible systems. In order to perform pivoting to other machines you first need a machine running Metasploit, and an exploit and payload, along with the target machine that you wish to compromise. There are then three main techniques. First, pivoting through the compromised target. The purpose here is to exploit another vulnerable system that is inaccessible externally. The exploitation will occur through the first victim and you will then be able to control the second victim or target using the same established session with the first target. The second option is forward relaying through the compromised target. The goal here is to browse any exposed resources such as websites or files on an internal system. The connection will be relayed through…

Contents