🔬Pivoting
🔬 Pivoting
Victim1 IP:
10.2.20.197
VIctim2 IP:
10.2.31.35
Pivoting technique with a network route to the internal network's subnet
Enumeration & Exploitation
Victim2 is on the same Victim1 subnet -
10.2.16.0/20
(look at the Interface 12)10.2.16.0/20
= from10.2.16.1
to10.2.31.254
=10.2.20.0/20
Pivoting
From the attacker's machine, a route through "Victim1
10.2.20.0/20
machine" is needed, to run MSF modules against Victim2 machine
Now, subnet
10.2.20.0/20
can be accessed withMSFconsole
Scan for open ports on the Victim2 system -
10.2.31.35
📌 The route is only applicable to
MSFconsole
, not outside of it
Port Forwarding
To perform an
nmap
scan on Victim2, a port forwarding need to be set up.e.g.
forward the remote port80
to an attacker machine local port, which will allow to perform a service version enumeration of the Victim2 service
Exploit Victim2 target machine
Last updated
Was this helpful?