I follow up until bind shell. I understand the need for different shells depending on the situation but I’m still learning use case scenarios
@stevecross91598 ай бұрын
Thanks very clear
@gaborantal997Ай бұрын
Could you please recommend some material for the explanation at 13:31. I don't really get the meterpreter autorute section.
@polygonbenАй бұрын
No worries - please see below resources - hopefully these should help :) kzbin.info/www/bejne/f2SxY5KXp75sgck docs.metasploit.com/docs/using-metasploit/intermediate/pivoting-in-metasploit.html www.offsec.com/metasploit-unleashed/pivoting/
@martinlastname85488 ай бұрын
But on the exam you are not given two machines. How do you identify the second IP address on a compromised machine?
@johanjimenez34616 ай бұрын
u can use a module of metasploit if is windows machine, if its a linux machine u can create a bash script where u do ping to the network with a loop, for example 192.168.0.x, the variable x increase +1
@TalesforTots1235 ай бұрын
What module specifically. I dont see it mentioned in any of the training material.
@boyuhuang39784 ай бұрын
@TalesforTots123 I guess after u obtain the meterpreter, u run bin bash and ifconfig command to see the victim-2 ip address and then try the autoroute command. after that, u can do a port scan or something to the victim-2 ip
@boyuhuang39784 ай бұрын
@@TalesforTots123in the Metasploit MSF video, they covered basic pivoting in the enumeration section