Pivoting

Once we have complete control over one computer in the system, our next step should be to pivot into the network and try exploiting and gaining access to as many machines as possible. In this recipe, we will learn the easy way to do this: by using Metasploit.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.54.6