Pivoting Introduction - eJPT lab

  Рет қаралды 5,068

Ben Folland

Ben Folland

Күн бұрын

Пікірлер: 13
@ReverseShell1337
@ReverseShell1337 10 ай бұрын
I follow up until bind shell. I understand the need for different shells depending on the situation but I’m still learning use case scenarios
@DrixoerTheDarklord
@DrixoerTheDarklord Жыл бұрын
Well explained. Thanks mate.
@gaborantal997
@gaborantal997 8 ай бұрын
Could you please recommend some material for the explanation at 13:31. I don't really get the meterpreter autorute section.
@polygonben
@polygonben 8 ай бұрын
No worries - please see below resources - hopefully these should help :) kzbin.info/www/bejne/f2SxY5KXp75sgck docs.metasploit.com/docs/using-metasploit/intermediate/pivoting-in-metasploit.html www.offsec.com/metasploit-unleashed/pivoting/
@camoo7815
@camoo7815 6 ай бұрын
Guide me on this. I found out that you'll get one IP on the exam. From that you have to identify the endpoints and then pivot to them. I found out two ways to find those is, with script to ping all the ips until I get the endpoints or use arp -a to get arp cache. Let me know if I am doing it correctly or is there any other on-point method to do it. Thanks ❤
@stevecross9159
@stevecross9159 Жыл бұрын
Thanks very clear
@martinlastname8548
@martinlastname8548 Жыл бұрын
But on the exam you are not given two machines. How do you identify the second IP address on a compromised machine?
@johanjimenez3461
@johanjimenez3461 Жыл бұрын
u can use a module of metasploit if is windows machine, if its a linux machine u can create a bash script where u do ping to the network with a loop, for example 192.168.0.x, the variable x increase +1
@TalesforTots123
@TalesforTots123 11 ай бұрын
What module specifically. I dont see it mentioned in any of the training material.
@boyuhuang3978
@boyuhuang3978 10 ай бұрын
​@TalesforTots123 I guess after u obtain the meterpreter, u run bin bash and ifconfig command to see the victim-2 ip address and then try the autoroute command. after that, u can do a port scan or something to the victim-2 ip
@boyuhuang3978
@boyuhuang3978 10 ай бұрын
​@@TalesforTots123in the Metasploit MSF video, they covered basic pivoting in the enumeration section
@camoo7815
@camoo7815 6 ай бұрын
​@@johanjimenez3461 that's the only way to find endpoints we can pivot to, on the exam? Is there a module for both OS. Asking because I am going for this exam
Information Gathering For Ethical Hackers
1:08:44
Aleksa Tamburkovski
Рет қаралды 24 М.
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 131 М.
How to pass eJPT Exam after a failed attempt
7:57
dailyCitizenIN
Рет қаралды 2,4 М.
Port Forwarding & Tunneling
10:41
Ryan John
Рет қаралды 13 М.
Pivot Through Multiple Networks | Master Network Pivoting
9:52
Netsec Explained
Рет қаралды 6 М.
Detect Hackers & Malware on your Computer (literally for free)
16:38
Network Pivoting with Ligolo-NG
19:09
Gonski Cyber
Рет қаралды 38 М.
OpenAdmin - HackTheBox walkthrough
46:34
Ben Folland
Рет қаралды 141
Car Hacking & CAN Bus Reverse Engineering Seminar
1:28:29
Matthew KuKanich
Рет қаралды 26 М.
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН