Pivoting with Metasploit

We again explore pivoting, which is using a compromised machine to get to a previously inaccessible network. This time we use the Metasploit Framework and additionally discuss and demonstrate port forwarding in Metasploit.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *