Pivoting with Metasploit
We again explore pivoting, which is using a compromised machine to get to a previously inaccessible network. This time we use the Metasploit Framework and additionally discuss and demonstrate port forwarding in Metasploit. https://youtu.be/THa41WJg8C0?si=hz1RHIOx7mUJwW5y