🔬Pivoting
🔬 Pivoting
Victim1 IP:
10.2.20.197VIctim2 IP:
10.2.31.35Pivoting technique with a network route to the internal network's subnet
Enumeration & Exploitation
ping 10.2.20.197
PING 10.2.20.197 (10.2.20.197) 56(84) bytes of data.
64 bytes from 10.2.20.197: icmp_seq=1 ttl=125 time=2.25 ms
64 bytes from 10.2.20.197: icmp_seq=2 ttl=125 time=1.99 ms
ping 10.2.31.35
PING 10.2.31.35 (10.2.31.35) 56(84) bytes of data.
# No response from Victim2service postgresql start && msfconsole -qdb_status
workspace -a Pivoting
db_nmap -sV -p 80 10.2.20.197
80/tcp open http HttpFileServer httpd 2.3Victim2 is on the same Victim1 subnet -
10.2.16.0/20(look at the Interface 12)10.2.16.0/20= from10.2.16.1to10.2.31.254=10.2.20.0/20
Pivoting
From the attacker's machine, a route through "Victim1
10.2.20.0/20machine" is needed, to run MSF modules against Victim2 machine
Now, subnet
10.2.20.0/20can be accessed withMSFconsole
Scan for open ports on the Victim2 system -
10.2.31.35

📌 The route is only applicable to
MSFconsole, not outside of it
Port Forwarding
To perform an
nmapscan on Victim2, a port forwarding need to be set up.e.g.forward the remote port80to an attacker machine local port, which will allow to perform a service version enumeration of the Victim2 service

Exploit Victim2 target machine


Last updated
Was this helpful?