We again explore pivoting, which is using a compromised machine to get to a previously inaccessible network. This time we use the Metasploit Framework and additionally discuss and demonstrate port forwarding in Metasploit.
Techno babble
We again explore pivoting, which is using a compromised machine to get to a previously inaccessible network. This time we use the Metasploit Framework and additionally discuss and demonstrate port forwarding in Metasploit.